McAfee is the device-to-cloud cybersecurity company. Inspired by the power of working together, McAfee creates business and consumer solutions that make our world a safer place. Take a look at our latest blogs.

McAfee Blog Feed

More from McAfee

Family Safety Identity Protection

Before You Share, Ask Yourself “Is This TMI?”

Social networks and new online services make it easy to share the details of our lives, perhaps too easily. With just a few clicks, posts and messages, you can give away enough personal information to compromise your privacy and even open yourself up to identity theft. Hackers use information you ...


Accessibility Requirements in the Internet of Things

In system engineering, and good system design begins with establish good “requirements”.  Requirements are not just technical and engineering features, they can also be operational (what are the designed configuration features,  what is the required uptime, downtime or service interval, etc) and requirements can be business-orient related to regulatory obligations ...

Mobile and IoT Security

What Master Key? – Android Signature Bypass Vulnerability

Recently, a vulnerability in Android package signature verification was announced by Jeff Forristal, CTO of Bluebox Security. Jeff plans on revealing details at the upcoming BlackHat Briefings at the end of this month. Though he has not released any details on his findings beyond the initial blog post more information ...

Mobile and IoT Security

Does Kik Messenger Pose a Danger to Your Kids?

With more than 50 million users, and reportedly growing by 20,000 everyday, Kik has become one of the most popular messaging apps on the market. It is widely used as a messaging portal between those who want to connect privately off of other social media (Facebook, Twitter, and Instagram). But ...

Identity Protection

How the Proliferation of Mobile Devices is Impacting Consumer Security

Mobile technology is the new frontier for fraudsters. Most of us don’t protect our smartphones or tablets—and the private information they contain—anywhere near as well as we do our wallets and PCs (even though most us would rather lose our wallets vs. our smartphones). Even the simple safeguard of a ...


Taking Control Of Your Data In The Cloud

This blog was written by David Bull, McAfee’s former Director, Enterprise Solution Marketing. Who has access to my online data? What measures are being taken to protect it? What can I do to make sure it doesn’t end up in the wrong hands? The concerns behind these questions are rooted in our ...

Family Safety Identity Protection

What is Typosquatting?

Typosquatting, also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright) that targets Internet users who incorrectly type a website address into their web browser (e.g., “” instead of “”). When users make such a typographical error, they may be led ...

Mobile and IoT Security

McAfee Hidden Device Admin Detector – Free Protection from Android Malware

A few weeks ago, we told you about Obad, a backdoor Trojan that targets the Android operating system (OS). What differentiates a Trojan from a traditional virus is that this type of software attempts to masquerade as something useful in order to trick users into opening the file and then ...

McAfee Labs

Styx Exploit Kit Takes Advantage of Vulnerabilities

Web-based malware has increased over the last few years due to an abrupt spike in new exploit kits. These kits target vulnerabilities in popular applications and provide an effective way for cybercriminals to distribute malware. We have already discussed Red Kit, a common exploit kit. Recently McAfee Labs has observed ...

Mobile and IoT Security McAfee Labs

Mobile Malware Plays Hide and Seek

Android/Obad.A is mobile malware that has been described as very complex. Truly it is one of the most complex we’ve seen because it: Uses Bluetooth to infect other Android devices Accepts commands from the attacker Hides from the Device Administration list This is a good collection of malicious activities for ...

Subscribe to McAfee Securing Tomorrow Blogs