Featured Blogs
Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation
Executive Summary Many malware attacks designed to inflict damage on a network are armed with lateral movement capabilities. Post initial...
Digital Divorce: Who Gets the Airline Miles and Music Files?
Something you’ll want to know about all those movies, mp3s, eBooks, air miles, and hotel points you’ve accrued over the years: they’re digital assets that can factor...
Clever Billing Fraud Applications on Google Play: Etinu
Authored by: Sang Ryol Ryu and Chanung Pak A new wave of fraudulent apps has made its way to the...
McAfee VP Shares His Four Pledges for a Healthier Lifestyle
After experiencing a health scare that changed his life, VP of Technology Services, Paul, vowed to make incremental changes by...
McAfee Awarded “Cybersecurity Excellence Awards”
In a year where people relied on their digital lives more than ever before and a dramatic uptick in attacks quickly followed, McAfee’s protection stood strong. We’re proud to...
Why Coin Miners Go Bad & How to Protect Your Tech When They Do
Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and Monero to cash in on the recent gold rush. Bitcoin’s meteoric rise in value is...
McAfee Labs Report Reveals Latest COVID-19 Threats and Malware Surges
The McAfee Advanced Threat Research team today published the McAfee Labs Threats Report: April 2021. In this edition, we present...
BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain
Recently, the McAfee Mobile Research Team uncovered several new variants of the Android malware family BRATA being distributed in Google...
What Is a Trojan?
You may vaguely remember reading Virgil’s epic poem “Aeneid” back when you were in school. The story of Odysseus and...
What Is a Password Manager?
Many of us rely on passwords to secure our digital devices and online accounts, from our personal computers and mobile...