FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ WIRED

This Is the Platform Google Claims Is Behind a 'Staggering’ Scam Text Operation

By: Matt Burgess — November 12th 2025 at 10:00
Google is suing 25 people it alleges are behind a “relentless” scam text operation that uses a phishing-as-a-service platform called Lighthouse.
☐ ☆ ✇ McAfee Blogs

This Week in Scams: Fake Steaks and Debit Card Porch Pirates

By: McAfee — November 7th 2025 at 17:46

We’re back with a new edition of “This Week in Scams,” a roundup of what’s current and trending in all things sketchy online.

This week, we have fake steaks, why you should shop online with a credit card, and a new and utterly brash form of debit card fraud.

Fake steaks from “0maha Steaks”

Yes, the letter “O” for Omaha in the subject line of this email scam is actually a zero. And that’s not the only thing that’s off with this email, it’s a total scam.

An image of a scam 0maha Steaks email.

 

If you like your choice cuts, the name Omaha Steaks might be a familiar one. They’ve been around for almost 110 years, and since 1953 they’ve been in the mail order meat business. Today, they sell, well, just about anything you can picture in the butcher or seafood case. With that, the company enjoys a premium reputation, so it’s little surprise scammers have latched onto it and built a phishing attack around the brand—one they garnish with a nod to concerns over rising food prices.

A few things can quickly tip you off to this scam. For starters, the scammers oddly spell Omaha with a zero in the subject line, as mentioned. From there, the sender’s email address is a straight ref flag. In this case, it’s the curiously spelled “steaksamplnext” followed by a (redacted) domain name that isn’t the legitimate omahasteaks dot-com address. Also curious is the lack of an actual price for the bogus “Gourmet Box.” And lastly, you might think that a premium foods brand would showcase some pictures of their famous fare in the email. Not so here.

Rounding it out, you’ll see the classic scammer tactics of scarcity and urgency, which scammers hope will pressure people to act immediately. In this case, only 500 of these supposed boxes are available, and the offer “concludes tomorrow.”

How to avoid Omaha Steak scams and phishing scams like them

Even as this scam makes the rounds, it’s easy to spot if you give it a closer look and a little thought—giving it a sort of old-school feel to it. However, more and more of today’s phishing emails look increasingly legit, thanks to AI tools, which might get you to click.

As for phishing attacks like this in general, you can protect yourself by:

Always checking the email address of the sender. If it doesn’t match the proper address of the company or brand that’s supposedly sending the email, it’s a scam. In this case, from the people at Omaha Steaks themselves, “If it doesn’t show OmahaSteaks.com and @OmahaSteaks, it’s not us!”

Looking for addresses and links that look like they’ve been slightly altered so that they seem “close enough” to the real thing. In this case, the scammer didn’t even bother to try. However, you could expect an alteration like “omahasteakofferforyou.com” to try and look legit.

Getting a scam detector. Our Scam Detector, found in all core McAfee plans, helps you stay safer with advanced scam detection technology built to spot and stop scams across text messages, emails, and videos. It’ll also block those sites if you accidentally tap or click on a bad link.

One good reason for using your credit card when shopping online.

What’s the most common kind of fraud? If you said, “credit card,” you’ll find it number five on the list. The top form is debit cards, according to 2025 findings from the U.S. Federal Reserve.

As reported by financial institutions, the Fed found that attempts at debit card fraud rose to 73% with 52% of those attempts being successful.

There’s a good reason for that debit card fraud ranks highest for attempts and success rate. It’s the same reason that credit card fraud is relatively low. Debit cards don’t have the same fraud protections in place that credit cards do.

As you might have read in our blogs before, credit cards offer additional protection thanks to the Fair Credit Billing Act (FCBA). Your maximum liability is $50 for fraudulent charges on a lost or stolen card if you report the loss to your issuer within 60 days. In the case of relatively unprotected debit cards, those losses often go unrecovered.

Keep this in mind as you sit down for your online shopping for the holidays: use a credit card instead of a debit card. That gives you the protection of the FCBA if your shopping session gets hacked or if the retailer experiences a data breach somewhere down the road. Also think about making it even safer by shopping with a VPN. Our VPN creates an encrypted “tunnel” that protects your data from crooks and prying eyes, so your card info stays private.

A new debit card scam with a porch pirate twist

First reported by the FBI last year, we’re seeing continued reports of a brash and bold form of debit card scam—people physically handing over their cards to scammers.

The scam starts like many card scams do, with a phone call. Scammers spoof the caller ID of the victim’s bank or credit union, ring them up, and tell them there’s a “problem” with their account. From there, scammers direct victims to cut up their current card—but with a twist. They tell victims to keep the little EMV chip for tap-and-go payments intact.

Why? Victims get instructed to leave the cut-up card and intact chip in the mailbox for a “courier” to pick up for “security purposes.” Once in hand, scammers get access to the bank account associated with the chip. Even if the scammers don’t wrangle a PIN number out of their victims with a little social engineering trickery, they can still make purchases with the chip as some points of sale don’t require a PIN number when tapping to pay.

Here’s how you can avoid the “porch pirate” debit card scam

Shred your old cards in a paper shredder. Then, take the next step. Grab the shredded pieces and throw them away in separate batches. This will all make it fantastically tough for a scammer to piece together your card and steal your info.

Call back your bank yourself. If you get a call, voicemail, or text saying there’s an issue with your account, you can verify any possible issue yourself by calling the number on the back of your card.

Know that banks won’t send “couriers” for cards. And they’ll simply never ask you to leave your card in your mailbox.

Other scam and cybersecurity headlines this week

That’s our roundup for this week. We’ll catch you next Friday with more updates, scam news, and ways you can stay safer out there.

The post This Week in Scams: Fake Steaks and Debit Card Porch Pirates appeared first on McAfee Blog.

☐ ☆ ✇ WIRED

The Government Shutdown Is a Ticking Cybersecurity Time Bomb

By: Lily Hay Newman — November 7th 2025 at 22:34
Many critical systems are still being maintained, and the cloud provides some security cover. But experts say that any lapses in protections like patching and monitoring could expose government systems.
☐ ☆ ✇ WIRED

Mexico City Is the Most Video-Surveilled Metropolis in the Americas

By: Dalila Sarabia — November 7th 2025 at 11:00
Despite 83,000 public cameras, crime in Mexico City remains high—and widespread surveillance raises myriad ethical issues.
☐ ☆ ✇ McAfee Blogs

The Louvre Used Its Own Name as a Password. Here’s What to Learn From It

By: Brooke Seipel — November 6th 2025 at 00:21
The Louvre at night

If you’ve been watching the news, you’ve probably seen the headlines out of Paris: one of the most audacious heists in decades took place at the Louvre, where thieves made off with centuries-old crown jewels worth tens of millions of dollars.

But amid the cinematic drama, a quieter detail emerged that’s almost harder to believe—according to French newspaper Libération (via PC Gamer), auditors discovered that the password protecting the museum’s video surveillance system was simply “Louvre.”

While it’s not yet confirmed whether this played a direct role in the robbery, cybersecurity experts point out that weak or reused passwords remain one of the easiest ways for criminals—digital or otherwise—to get inside.

Safety Lessons You Can Learn from The Louvre

The Louvre’s cybersecurity audits, dating back to 2014, reportedly revealed a pattern of outdated software and simple passwords that hadn’t been updated in years. Subsequent reviews noted “serious shortcomings,” including security systems running on decades-old software no longer supported by developers.

That situation mirrors one of the most common security issues individuals face at home. Whether it’s an email account, a social media login, or your home Wi-Fi router, using an easy or repeated password is like leaving the front door open. Hackers don’t need to break in when they can just walk through.

As experts here at McAfee have explained, cybercriminals routinely rely on “credential stuffing” attacks, in which they test stolen passwords from one breach against other sites to see what else they can access. If you’ve used the same password for your streaming account and your online banking, it’s not hard to imagine what could go wrong.

What’s A Bad Password?

  • Obvious or guessable: Anything like “password,” “123456,” or even the name of the service (“Louvre,” “Netflix,” “Chase”) can be cracked in seconds.
  • Dictionary words: Real words or phrases are easier for hacking programs to guess, even when combined creatively.
  • Repeated passwords: Reusing a password across multiple sites means one breach can expose everything.
  • Personal details: Pet names, birthdays, and favorite bands can all be scraped from social media—making them the first thing a hacker will try.

What Makes A Strong Password

A strong password is long, complex, and unique. Cybersecurity experts recommend at least 12–16 characters that mix uppercase and lowercase letters, numbers, and symbols. A short password can be guessed in minutes; a long one can take decades to crack.

If that sounds like a lot to juggle, you’re not alone. That’s why password managers exist.

Why A Password Manager Is Your Best Guard

A password manager takes the work—and the guesswork—out of creating and remembering complex passwords. It generates random combinations that are nearly impossible to crack, then stores them securely using advanced encryption.

The added bonus? You’ll never have to reuse a password again. Even if one account is theoretically compromised in a breach, your others remain protected because each password is unique.

McAfee’s password manager also uses multi-factor authentication (MFA), meaning you’ll need at least two forms of verification before signing in—like a code sent to your phone. That extra step can stop hackers cold, even if they somehow get your password.

How to protect yourself

To keep your digital treasures safer than the Louvre’s jewels:

  • Use strong, unique passwords for every account. Longer is better.
  • Change passwords regularly and especially after any breach or suspicious activity.
  • Turn on MFA wherever possible—it’s one of the simplest and most effective protections.
  • Avoid public Wi-Fi for sensitive logins, or use a secure VPN.
  • Store passwords safely with a reputable password manager instead of your browser or a notepad.

The bottom line

Reports of the Louvre’s weak password might make for an easy punchline, but the truth is that millions of people make the same mistake every day—reusing simple passwords across dozens of accounts. Strong, unique passwords (and the right tools to manage them) are still one of the most powerful defenses against data theft and identity fraud.

As scams and breaches continue to evolve, your best defense is awareness and protection that adapts just as fast. McAfee’s built-in Scam Detector, included in all core plans, automatically detects scams across text, email, and video, blocks dangerous links, and identifies deepfakes—stopping harm before it happens.

The post The Louvre Used Its Own Name as a Password. Here’s What to Learn From It appeared first on McAfee Blog.

☐ ☆ ✇ WIRED

Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan

By: Craig Silverman — November 6th 2025 at 11:30
Rob Leathern and Rob Goldman, who both worked at Meta, are launching a new nonprofit that aims to bring transparency to an increasingly opaque, scam-filled social media ecosystem.
☐ ☆ ✇ WIRED

Zohran Mamdani Just Inherited the NYPD Surveillance State

By: Ali Winston — November 5th 2025 at 17:51
In addition to affordability, New York City’s mayor-elect will be forced to reckon with the NYPD’s sweeping mass surveillance operations.
☐ ☆ ✇ WIRED

FBI Warns of Criminals Posing as ICE, Urges Agents to ID Themselves

By: Dell Cameron, Caroline Haskins — November 4th 2025 at 19:30
In a bulletin to law enforcement agencies, the FBI said criminal impersonators are exploiting ICE’s image and urged nationwide coordination to distinguish real operations from fakes.
☐ ☆ ✇ WIRED

Hack Exposes Kansas City’s Secret Police Misconduct List

By: Dhruv Mehrotra, Peggy Lowe — November 3rd 2025 at 10:00
A major breach of the Kansas City, Kansas, Police Department reveals, for the first time, a list of alleged officer misconduct including dishonesty, sexual harassment, excessive force, and false arrest.
☐ ☆ ✇ WIRED

ICE Wants to Build a Shadow Deportation Network in Texas

By: Dell Cameron — October 30th 2025 at 16:48
A new ICE proposal outlines a 24/7 transport operation run by armed contractors—turning Texas into the logistical backbone of an industrialized deportation machine.
☐ ☆ ✇ WIRED

The Microsoft Azure Outage Shows the Harsh Reality of Cloud Failures

By: Lily Hay Newman — October 29th 2025 at 20:20
The second major cloud outage in less than two weeks, Azure’s downtime highlights the “brittleness” of a digital ecosystem that depends on a few companies never making mistakes.
☐ ☆ ✇ WIRED

Ex-L3Harris Cyber Boss Pleads Guilty to Selling Trade Secrets to Russian Firm

By: Kim Zetter — October 29th 2025 at 17:13
Peter Williams, a former executive of Trenchant, L3Harris’ cyber division, has pleaded guilty to two counts of stealing trade secrets and selling them to an unnamed Russian software broker.
☐ ☆ ✇ WIRED

CBP Searched a Record Number of Phones at the US Border Over the Past Year

By: Matt Burgess, Dell Cameron — October 28th 2025 at 15:26
The total number of US Customs and Border Protection device searches jumped by 17 percent over the 2024 fiscal year, but more invasive forensic searches remain relatively rare.
☐ ☆ ✇ WIRED

This Is the Nuclear-Powered Ship Deployed in Trump’s War on Drug Boats

By: Fernanda González — October 28th 2025 at 09:00
The USS Gerald R. Ford is a $13 billion aircraft carrier sailing to the Caribbean with nuclear propulsion, an electromagnetic plane launcher, and 90 aircraft onboard.
☐ ☆ ✇ WIRED

Hundreds of People With ‘Top Secret’ Clearance Exposed by House Democrats’ Website

By: Lily Hay Newman, Matt Burgess — October 27th 2025 at 10:30
A database containing information on people who applied for jobs with Democrats in the US House of Representatives was left accessible on the open web.
☐ ☆ ✇ WIRED

Chatbots Are Pushing Sanctioned Russian Propaganda

By: Matt Burgess, Natasha Bernal — October 27th 2025 at 09:00
ChatGPT, Gemini, DeepSeek, and Grok are serving users propaganda from Russian-backed media when asked about the invasion of Ukraine, new research finds.
☐ ☆ ✇ WIRED

Amazon Explains How Its AWS Outage Took Down the Web

By: Matt Burgess, Lily Hay Newman — October 25th 2025 at 10:30
Plus: The Jaguar Land Rover hack sets an expensive new record, OpenAI’s new Atlas browser raises security fears, Starlink cuts off scam compounds, and more.
☐ ☆ ✇ WIRED

DHS Wants a Fleet of AI-Powered Surveillance Trucks

By: Dell Cameron — October 24th 2025 at 22:59
US border patrol is asking companies to submit plans to turn standard 4x4 trucks into AI-powered watchtowers—combining radar, cameras, and autonomous tracking to extend surveillance on demand.
☐ ☆ ✇ WIRED

How Hacked Card Shufflers Allegedly Enabled a Mob-Fueled Poker Scam That Rocked the NBA

By: Andy Greenberg — October 23rd 2025 at 23:51
WIRED recently demonstrated how to cheat at poker by hacking the Deckmate 2 card shufflers used in casinos. The mob was allegedly using the same trick to fleece victims for millions.
☐ ☆ ✇ WIRED

This ‘Privacy Browser’ Has Dangerous Hidden Features

By: Matt Burgess — October 23rd 2025 at 09:30
The Universe Browser is believed to have been downloaded millions of times. But researchers say it behaves like malware and has links to Asia’s booming cybercrime and illegal gambling networks.
☐ ☆ ✇ WIRED

No, ICE (Probably) Didn’t Buy Guided Missile Warheads

By: Caroline Haskins — October 22nd 2025 at 20:31
A federal contracting database lists an ICE payment for $61,218 with the payment code for “guided missile warheads and explosive components.” But it appears ICE simply entered the wrong code.
☐ ☆ ✇ WIRED

The Long Tail of the AWS Outage

By: Lily Hay Newman — October 22nd 2025 at 16:31
Experts say outages like the one that Amazon experienced this week are almost inevitable given the complexity and scale of cloud technology—but the duration serves as a warning.
☐ ☆ ✇ McAfee Blogs

AWS Outage Disrupts Major Apps Like Reddit and Snapchat—What Happened and How to Stay Safe

By: Brooke Seipel — October 20th 2025 at 22:13

Amazon Web Services (AWS), one of the world’s largest cloud providers, recently experienced a major outage that disrupted popular websites and apps across the globe—including Snapchat, Reddit, Fortnite, Ring, and Coinbase, according to reports from CNN and CNBC.

The disruption began out of Northern Virginia, where many of the internet’s most-used applications are hosted.

AWS said the problem originated within its EC2 internal network, impacting more than 70 of its own services, and was tied to DNS issues, the system that tells browsers how to find the right servers online.

A few hours after the initial reports of outages, AWS said the problem had been “fully mitigated,” though it took several more hours for all users to see their systems stabilized, according to CNBC.

There is no indication the outage was caused by a cyberattack, and Amazon continues to investigate the root cause.

Why So Many Apps Went Down

When Amazon Web Services falters, the ripple effects reach far beyond businesses. Millions of consumers suddenly lose access to everyday apps and tools, including everything from banking and airline systems to gaming platforms and smart home devices.

“In the past, companies ran their own servers—if one failed, only that company’s customers felt it,” said Steve Grobman, McAfee’s Chief Technology Officer. “Today, much of the internet runs on shared backends like Amazon Web Services or Google Cloud. That interconnectedness makes the web faster and more efficient, but it also means one glitch can impact dozens of services at once.”

Grobman noted the issue was related to a capability called DNS within AWS, he described DNS as providing the directions on how systems find each other and even if those systems are operational, it can be detrimental.. It’s analogous to  “tearing up a map or turning off your GPS before driving to the store.” The store might still be open and stocked, he explained, but if you can’t find your way there, it doesn’t matter.

“Even with rigorous safeguards in place, events like this remind us just how complex and intertwined our digital world has become,” Grobman added. “It highlights why resilience and layered protection matter more than ever.”

Outages Create Confusion—And Opportunity for Scammers

Events like this sow uncertainty for consumers. When apps fail to load, people may wonder: Is my account hacked? Is my data at risk? Is it just me?

Cybercriminals exploit that confusion. After past outages, McAfee researchers have seen phishing campaigns, fake refund emails, and malicious links promising “fixes” or “status updates” appear within hours.

Scammers often mimic legitimate service alerts—complete with logos and urgent wording—to trick users into entering passwords or payment information. Others push fake customer-support numbers or send direct messages claiming to “restore access.”

How to Protect Yourself During a Major Outage

Here’s how to stay secure when the :

  1. Pause before you click. Be skeptical of any unsolicited message about outages, refunds, or account verification.
  2. Go straight to the source. Check the official app or website status pages—don’t follow links in emails or texts.
  3. Ignore urgent “fix” offers. Legitimate companies won’t ask you to download tools or send payment to restore access.
  4. Watch for red flags. Requests for money via gift cards, crypto, or wire transfers are almost always scams.
  5. If you clicked a suspicious link:
    1. Change your password immediately (and for any accounts using the same one).
    2. Turn on or refresh two-factor authentication (2FA).
    3. Monitor recent transactions and set up alerts.
    4. Run a trusted security scan to remove any unwanted apps or remote-access tools.

How McAfee Can Help

Using advanced artificial intelligence, McAfee’s Scam Detector automatically detects scams across text, email, and video, blocks dangerous links, and identifies deepfakes, stopping harm before it happens.

McAfee’s identity protection tools also monitor for signs that your personal information may have been exposed and guide you through steps to recover quickly.

Sign in to your McAfee account to scan for recent breaches linked to your email. You can also sign up for a free trial of McAfee antivirus to protect your devices.

The post AWS Outage Disrupts Major Apps Like Reddit and Snapchat—What Happened and How to Stay Safe appeared first on McAfee Blog.

☐ ☆ ✇ WIRED

What to Know About the Shocking Louvre Jewelry Heist

By: Paolo Armelli — October 20th 2025 at 18:18
In just seven minutes, the thieves took off with crown jewels containing with thousands of diamonds along with other precious gems.
☐ ☆ ✇ WIRED

What the Huge AWS Outage Reveals About the Internet

By: Lily Hay Newman — October 20th 2025 at 14:22
Amazon Web Services experienced DNS resolution issues on Monday morning, taking down wide swaths of the web—and highlighting a long-standing weakness in the internet's infrastructure.
☐ ☆ ✇ WIRED

Anthropic Has a Plan to Keep Its AI From Building a Nuclear Weapon. Will It Work?

By: Matthew Gault — October 20th 2025 at 09:00
Anthropic partnered with the US government to create a filter meant to block Claude from helping someone build a nuke. Experts are divided on whether its a necessary protection—or a protection at all.
☐ ☆ ✇ WIRED

Hackers Dox ICE, DHS, DOJ, and FBI Officials

By: Andy Greenberg, Matt Burgess — October 18th 2025 at 10:30
Plus: A secret FBI anti-ransomware task force gets exposed, the mystery of the CIA’s Kryptos sculpture is finally solved, North Koreans busted hiding malware in the Ethereum blockchain, and more.
☐ ☆ ✇ McAfee Blogs

Hackers Trick Staff Into Exposing Major Companies’ Salesforce Data–Find Out if You’re Safe

By: Brooke Seipel — October 17th 2025 at 16:55

Cybercriminals tricked employees at major global companies into handing over Salesforce access and used that access to steal millions of customer records. 

Here’s the McAfee breakdown on what happened, what information was leaked, and what you need to know to keep your data and identity safe: 

What’s Happening 

Hackers claim they’ve stolen customer data from multiple major companies, including household names like Adidas, Cisco, Disney, Google, IKEA, Pandora, Toyota, and Vietnam Airlines. Security Week has reported throughout 2025 on a wave of social-engineering attacks exploiting human – rather than platform – vulnerabilities. 

According to The Wall Street Journal, the hacking group has already released millions of Qantas Airlines customer records and is threatening to expose information from other companies next.  

The data reportedly includes names, email addresses, phone numbers, dates of birth, and loyalty program details. While it doesn’t appear that financial data was included, this kind of personal information can still be exploited in phishing and scam campaigns. 

Salesforce has issued multiple advisories stressing that these attacks stem from credential theft and malicious connected apps – not from a breach of its infrastructure. 

Unfortunately, incidents like this aren’t rare, and they’re not limited to any one platform or industry. Even the most sophisticated companies can fall victim when hackers rely on social engineering and manipulation to breach secure systems. 

How the Hackers Did it 

Hackers reportedly called various companies’ employees pretending to be IT support staff—a tactic known as “vishing”—and convinced them to share login credentials or connect fake third-party tools, essentially handing the criminals the keys to their accounts. Once inside, they accessed customer databases and stole the information stored there. 

Think of it less like a burglar breaking a lock, and more like someone being tricked into opening the door. 

What data was leaked 

So far, leaked data appears to include: 

  • Names and email addresses 
  • Phone numbers 
  • Dates of birth 
  • Home or mailing addresses 
  • Loyalty or frequent-flyer numbers 

There’s no indication of credit card or banking data in the confirmed leaks, but that doesn’t mean you’re in the clear.  

Why this matters to you 

Even if your financial information isn’t exposed in a data breach, personal details like name and address can still be used for targeted scams and phishing.  When that information is stolen and sold online, scammers use it to: 

  • Send realistic phishing emails or texts that reference real details about you. 
  • Try to log into your other accounts if you reuse passwords. 
  • Launch “refund” or “account verification” scams tied to brands you trust. 

Even if your data isn’t part of this specific leak, these attacks highlight how often your information moves through third-party systems you don’t control. 

How to find out if you’ve been affected 

  • Check your email: If you’re a member or customer of one of the named companies, watch for official notifications.  
  • Avoid “dark web lookup” services: Some of these are scams themselves. Stick to legitimate sources. 

What to do now 

1) Change your passwords—today.
Use strong, unique passwords for every account. McAfee’s password manager can help. Try our random password generator here. 

2) Turn on two-factor authentication (2FA).
Even if a hacker has your password, they can’t get in without your code. 

3) Monitor your financial and loyalty accounts.
Watch for strange charges, redemptions, or password reset emails you didn’t request. 

4) Freeze your credit.
It’s free and prevents new accounts from being opened in your name. You can unfreeze it anytime. McAfee users can employ a “security freeze” for extra protection. 

5) Be extra cautious with “breach” emails or calls.
Scammers often pretend to be from affected companies to “help you secure your account.” Don’t click links or give information over the phone. Go directly to the company’s website or app or your own IT team if a breach happens at your workplace. 

6) Consider identity protection.
McAfee’s built-in identity monitoring can monitor your personal info across the dark web, send alerts if your data appears in a breach, and include up to $1 million in coverage for identity recovery expenses. 

 

What scams to expect next 

  • Fake refund or compensation offers. “We noticed your account was impacted. Claim your refund here.” Don’t click. 
  • Loyalty-point phishing. Emails that look like they’re from an airline or retailer asking you to log in to “protect your rewards.” 
  • MFA fatigue scams. Attackers repeatedly send login codes to wear you down, then call pretending to be support asking you to read one aloud. Don’t. 

 

Need ongoing protection? 

Your data could already be out there, but you don’t have to leave it there. 

McAfee helps you take back control. Using advanced artificial intelligence, McAfee’s Scam Detector automatically detects scams across text, email, and video, blocks dangerous links, and identifies deepfakes, stopping harm before it happens. 

And McAfee’s Personal Data Cleanup can help you check which data brokers have your private details and request to have it removed on your behalf. 

Stay ahead of scammers. Check your exposure, clean up your data, and protect your identity, all with McAfee. 

Learn more about McAfee and McAfee Scam Detector 

 

More reading: 

What to do if you’re caught up in a data breach 

How to delete yourself from the internet 

How to spot phishing emails and scams  

The post Hackers Trick Staff Into Exposing Major Companies’ Salesforce Data–Find Out if You’re Safe appeared first on McAfee Blog.

☐ ☆ ✇ WIRED

One Republican Now Controls a Huge Chunk of US Election Infrastructure

By: Kim Zetter — October 16th 2025 at 14:01
Former GOP operative Scott Leiendecker just bought Dominion Voting Systems, giving him ownership of voting systems used in 27 states. Election experts don't know what to think.
☐ ☆ ✇ WIRED

A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

By: Dan Goodin, Ars Technica — October 14th 2025 at 21:40
The malicious app required to make a “Pixnapping” attack work requires no permissions.
☐ ☆ ✇ WIRED

Feds Seize Record-Breaking $15 Billion in Bitcoin From Alleged Scam Empire

By: Matt Burgess, Andy Greenberg — October 14th 2025 at 17:34
Officials in the US and UK have taken sweeping action against “one of the largest investment fraud operations in history,” confiscating a historic amount of funds in the process.
☐ ☆ ✇ WIRED

Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

By: Andy Greenberg, Matt Burgess — October 14th 2025 at 01:00
With just $800 in basic equipment, researchers found a stunning variety of data—including thousands of T-Mobile users’ calls and texts and even US military communications—sent by satellites unencrypted.
☐ ☆ ✇ WIRED

'Happy Gilmore' Producer Buys Spyware Maker NSO Group

By: Lily Hay Newman — October 11th 2025 at 10:30
Plus: US government cybersecurity staffers get reassigned to do immigration work, a hack exposes sensitive age-verification data of Discord users, and more.
☐ ☆ ✇ WIRED

Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits

By: Lily Hay Newman — October 10th 2025 at 09:15
With the mercenary spyware industry booming, Apple VP Ivan Krstić tells WIRED that the company is also offering bonuses that could bring the max total reward for iPhone exploits to $5 million.
☐ ☆ ✇ WIRED

North Korean Scammers Are Doing Architectural Design Now

By: Matt Burgess — October 10th 2025 at 09:00
New research shows that North Koreans appear to be trying to trick US companies into hiring them to develop architectural designs using fake profiles, résumés, and Social Security numbers.
☐ ☆ ✇ WIRED

Apple Took Down These ICE-Tracking Apps. The Developers Aren't Giving Up

By: Reece Rogers, Lily Hay Newman — October 9th 2025 at 17:22
“We are going to do everything in our power to fight this,” says ICEBlock developer Joshua Aaron after Apple removed his app from the App Store.
☐ ☆ ✇ WIRED

Vibe Coding Is the New Open Source—in the Worst Way Possible

By: Lily Hay Newman — October 6th 2025 at 10:00
As developers increasingly lean on AI-generated code to build out their software—as they have with open source in the past—they risk introducing critical security failures along the way.
☐ ☆ ✇ WIRED

Apple and Google Pull ICE-Tracking Apps, Bowing to DOJ Pressure

By: Matt Burgess, Andy Greenberg, Andrew Couts — October 4th 2025 at 10:30
Plus: China sentences scam bosses to death, Europe is ramping up its plans to build a “drone wall” to protect against Russian airspace violations, and more.
☐ ☆ ✇ WIRED

ICE Wants to Build Out a 24/7 Social Media Surveillance Team

By: Dell Cameron — October 3rd 2025 at 13:21
Documents show that ICE plans to hire dozens of contractors to scan X, Facebook, TikTok, and other platforms to target people for deportation.
☐ ☆ ✇ WIRED

Google’s Latest AI Ransomware Defense Only Goes So Far

By: Lily Hay Newman — September 30th 2025 at 13:44
Google has launched a new AI-based protection in Drive for desktop that can shut down an attack before it spreads—but its benefits have their limits.
☐ ☆ ✇ WIRED

Tile Tracking Tags Can Be Exploited by Tech-Savvy Stalkers, Researchers Say

By: Kim Zetter — September 29th 2025 at 09:30
A team of researchers found that, by not encrypting the data broadcast by Tile tags, users could be vulnerable to having their location information exposed to malicious actors.
☐ ☆ ✇ WIRED

How a Travel YouTuber Captured Nepal’s Revolution for the World

By: Nicholas Slayton — September 28th 2025 at 14:40
Harry Jackson went into Kathmandu as a tourist. He ended up being one of the main international sources of news on Nepal’s Gen Z protests.
☐ ☆ ✇ WIRED

An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead

By: Andy Greenberg, Matt Burgess, Lily Hay Newman — September 27th 2025 at 14:25
Plus: A ransomeware gang steals data on 8,000 preschoolers, Microsoft blocks Israel’s military from using its cloud for surveillance, call-recording app Neon hits pause over security holes, and more.
☐ ☆ ✇ WIRED

‘SIM Farms’ Are a Spam Plague. A Giant One in New York Threatened US Infrastructure, Feds Say

By: Andy Greenberg, Lily Hay Newman, Matt Burgess — September 23rd 2025 at 18:09
The agency says it found a network of some 300 servers and 100,000 SIM cards—enough to knock out cell service in the NYC area. Experts say it mirrors facilities typically used for cybercrime.
☐ ☆ ✇ WIRED

DHS Has Been Collecting US Citizens’ DNA for Years

By: Dell Cameron — September 23rd 2025 at 15:06
Newly released data shows Customs and Border Protection funneled the DNA of nearly 2,000 US citizens—some as young as 14—into an FBI crime database, raising alarms about oversight and legality.
☐ ☆ ✇ WIRED

A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster

By: Matt Burgess — September 22nd 2025 at 06:00
The UK-based automaker has been forced to stop vehicle production as a result of the attack—costing JLR tens of millions of dollars and forcing its parts suppliers to lay off workers.
☐ ☆ ✇ WIRED

A Dangerous Worm Is Eating Its Way Through Software Packages

By: Lily Hay Newman, Andy Greenberg — September 20th 2025 at 10:30
Plus: An investigation reveals how US tech companies reportedly helped build China’s sweeping surveillance state, and two more alleged members of the Scattered Spider hacking group were arrested.
☐ ☆ ✇ WIRED

This Microsoft Entra ID Vulnerability Could Have Been Catastrophic

By: Matt Burgess, Lily Hay Newman — September 18th 2025 at 15:09
A pair of flaws in Microsoft's Entra ID identity and access management system could have allowed an attacker to gain access to virtually all Azure customer accounts.
☐ ☆ ✇ WIRED

Cybercriminals Have a Weird New Way to Target You With Scam Texts

By: Matt Burgess — September 18th 2025 at 11:00
Scammers are now using “SMS blasters” to send out up to 100,000 texts per hour to phones that are tricked into thinking the devices are cell towers. Your wireless carrier is powerless to stop them.
☐ ☆ ✇ WIRED

A DHS Data Hub Exposed Sensitive Intel to Thousands of Unauthorized Users

By: Andy Greenberg — September 16th 2025 at 17:07
A misconfigured platform used by the Department of Homeland Security left national security information—including some related to the surveillance of Americans—accessible to thousands of people.
☐ ☆ ✇ WIRED

Russia Tests Hypersonic Missile at NATO’s Doorstep—and Shares the Video

By: Javier Carbajal — September 15th 2025 at 17:49
Russian military exercises near NATO borders follow the recent incursion of Russian drones into the airspace of Poland and Romania, further stoking tensions with the West.
☐ ☆ ✇ WIRED

Jeffrey Epstein’s Yahoo Inbox Revealed

By: Lily Hay Newman, Dell Cameron — September 13th 2025 at 10:30
Plus: ICE deploys secretive phone surveillance tech, officials warn of Chinese surveillance tools in US highway infrastructure, and more.
☐ ☆ ✇ WIRED

Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

By: Lily Hay Newman — September 11th 2025 at 13:59
Alongside new iPhones, Apple released a new security architecture on Tuesday: Memory Integrity Enforcement aims to eliminate the most frequently exploited class of iOS bugs.
☐ ☆ ✇ WIRED

Here’s What to Know About Poland Shooting Down Russian Drones

By: Riccardo Piccolo — September 10th 2025 at 13:58
On Wednesday morning, Poland shot down several Russian drones that entered its airspace—a first since Moscow’s invasion of Ukraine. The incident disrupted air travel and set the region on edge.
☐ ☆ ✇ WIRED

US Investment in Spyware Is Skyrocketing

By: Vas Panagiotopoulos — September 10th 2025 at 11:00
A new report warns that the number of US investors in powerful commercial spyware rose sharply in 2024 and names new countries linked to the dangerous technology.
☐ ☆ ✇ WIRED

Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights

By: Dell Cameron — September 9th 2025 at 21:00
After 25 years at the Electronic Frontier Foundation, Cindy Cohn is stepping down as executive director. In a WIRED interview, she reflects on encryption, AI, and why she’s not ready to quit the battle.
☐ ☆ ✇ WIRED

A New Platform Offers Privacy Tools to Millions of Public Servants

By: Dell Cameron — September 9th 2025 at 10:00
From data-removal services to threat monitoring, the Public Service Alliance says its new marketplace will help public servants defend themselves in an era of data brokers and political violence.
☐ ☆ ✇ WIRED

Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World

By: Zeyi Yang — September 9th 2025 at 03:00
Geedge Networks, a company with ties to the founder of China’s mass censorship infrastructure, is selling its censorship and surveillance systems to at least four other countries in Asia and Africa.
☐ ☆ ✇ WIRED

ICE Has Spyware Now

By: Matt Burgess, Andy Greenberg, Lily Hay Newman — September 6th 2025 at 10:30
Plus: An AI chatbot system is linked to a widespread hack, details emerge of a US plan to plant a spy device in North Korea, your job’s security training isn’t working, and more.
☐ ☆ ✇ WIRED

Defense Department Scrambles to Pretend It’s Called the War Department

By: Dell Cameron — September 5th 2025 at 22:22
President Donald Trump said the so-called Department of War branding is to counter the “woke” Department of Defense name.
❌