McAfee is the device-to-cloud cybersecurity company. Inspired by the power of working together, McAfee creates business and consumer solutions that make our world a safer place. Take a look at our latest blogs.

McAfee Blog Feed

More from McAfee

Enterprise

Spearphishing Best Practices

What is the biggest threat to your company’s network? Look in the mirror. A huge percentage of recent high profile attacks, including those perpetrated on Epsilon, RSA, the Oak Ridge Laboratories in Tennessee, and the Gmail accounts of government officials—not to mention Operation SHADY Rat—are suspected to be based on ...

Enterprise

Building a Better Shady RAT Trap: Security Connected Framework

Recently Dmitri Alperovitch, McAfee’s VP of Threat Research, published a blog about Operation Shady RAT. In the blog and corresponding whitepaper he details an investigation of targeted intrusions into over 70 global companies, governments, and non-profit organizations over the last five years that appear to be sourced from a single ...

Family Safety Identity Protection

Myth: Apple Products Don’t Get Viruses

Have you ever bitten into an apple and found a worm? I have, and it’s yummy! Anyway, how many times have you heard, or even said, “I won’t get that computer virus because I have a Mac”?  While Mac users tend to feel somewhat insulated from viruses, it’s time for ...

Family Safety Identity Protection

15 Social Media Security Tips

1. Realize that you can become a victim at any time. Not a day goes by when we don’t hear about a new hack. With 55,000 new pieces of malware a day, security never sleeps. 2. Think before you post. Status updates, photos, and comments can reveal more about you ...

Family Safety Identity Protection

Social Networking Security Awareness

One in five online consumers has been a victim of cybercrime in the past two years. Social networking is a direct link to the problem. While social networks allow you to keep in touch with family and friends, there are issues to be concerned about. Most concerns revolve around online ...

Enterprise

June #SecChat Recap: Stealth Crimeware

Last week, we hosted our monthly #SecChat on Stealth Crimeware. When it comes to building malware, cyber criminals are getting smarter – employing stealth techniques with malware able to self-replicate and evade detection for long periods of time. It can be costly for enterprises to remediate the damage done to ...

Family Safety Identity Protection

15 Tips To Better Password Security

Protect your information by creating a secure password that makes sense to you, but not to others. Most people don’t realize there are a number of common techniques used to crack passwords and plenty more ways we make our accounts vulnerable due to simple and widely used passwords. How to ...

Enterprise

Hackers vs. Hackers: The New Frontier Of Embedded Devices

If we look at the evolution of hacking, certain techniques never go out of style, but we’re at the beginning of a big shift in terms of the targets.  The threat landscape has evolved beyond PCs, tablets, and smartphones to a whole new battleground: connected devices all around us. According ...

Family Safety Identity Protection

How to Reset Your Gmail Password After Being Hacked

I finally got one of those “I’m stuck in London” emails. My friend Kate’s Gmail account was hacked, and everyone on her contact list received an email from a hacker posing as Kate: “Hi, Apologies, but I made a quick trip, to London,United Kingdom and got mugged, my bag, stolen ...

McAfee Labs

Responses to Cybercrime in Japan and France

This week the Sorbonne University and the French Department of Justice hosted a meeting, the World and Development Institute (IMODEV) International Cybercrime, CyberThreat and CyberFraud Seminar. The audience heard eminent speakers including Pierre Joxe, a Member of the French Constitutional Council and former socialist Minister of the Interior, and Jacques Godfrain, ...

Subscribe to McAfee Securing Tomorrow Blogs