McAfee is the device-to-cloud cybersecurity company. Inspired by the power of working together, McAfee creates business and consumer solutions that make our world a safer place. Take a look at our latest blogs.

McAfee Blog Feed

More from McAfee

McAfee Labs

Travnet Trojan Could Be Part of APT Campaign

This blog post was written by Vikas Taneja. Attackers use all kinds of attack vectors to steal sensitive information from their targets. Their efforts are not limited to only zero-day vulnerabilities. Malware authors often exploit old vulnerabilities because a large number of organizations still use old vulnerable software. The Trojan ...

Family Safety Mobile and IoT Security

What You Should be Aware of When Using Your Android Device

As we all migrate towards using smartphones and tablets, we need to be aware of the risks associated with them. Most of us know that we need to protect our computers with security software, but we don’t always take that precaution with our mobile devices. In fact nearly 75% of ...

McAfee Labs

An Overview of Messaging Botnets

In the quarterly McAfee Threats Reports we offer our readers some charts on the prevalence of messaging botnets. For the last quarter of 2012, we announced the continuing decline in global messaging botnet infections as well as in former leaders Festi and Cutwail. In this blog, I will detail the ...

McAfee Labs

Android Malware Goes Bollywood

We already know that mobile malware is growing at a fantastic rate, but we now see a new trend that concerns us: specific regions targeted by mobile threats. Just last week McAfee Labs blogged about a new malware threat targeting phone owners in South Korea. Today we have identified another ...

Identity Protection

What is a Botnet?

The word botnet or bot is short for robot network.  A botnet is a group of Internet-connected personal computers that have been infected by a malicious applica­tion (malware) that allows a hacker to control the infected computers or mobile devices without the knowledge of the device owners. When malware is ...

McAfee Labs

Malware Behaves Oddly in Automated Analysis Environment

While testing malware recently, we got some logs from our automated analysis system showing a few samples that are only partially replicated. We have heuristics that predict the behavior of a sample; but if that prediction fails, then the heuristics identify the state of a sample and decide if it ...

Identity Protection Mobile and IoT Security

More Than 30% of People Don’t Password Protect Their Mobile Devices

Are you guilty as charged? Whenever I bring this up in a group setting, it astonishes me how many people raise their hands. I wonder if they realize that they are putting all the personal information contained on their mobile device at risk. The unfortunate reality is that everyone loses ...

Family Safety Identity Protection

Just One of Many Internet Scams

A good friend of mine called me recently to ask what I knew about scams from online sales. He had placed an ad on CraigsList for something he was trying to sell and had asked for $150 for the item. He had received a call from a woman and she ...

McAfee Partners

Top 5 Reasons To Participate in the McAfee Virtual Sales Kickoff

In 2013 we remain committed to investing in, growing with and optimizing for you, our channel partners. A prime example of this commitment is our Virtual Sales Kickoff (VSKO), where we take the same content created of our Sales Kickoff and make it available to you. This year’s VSKO features ...

Security Operations

Advanced Malware Protection with Network Security Platform

McAfee Network Security Platform customers have benefited from malware protection for some time now. Most customers already use McAfee Global Threat Intelligence (GTI), which has been available since the 6.0 release. The largest and most used reputation service, with over 64 Billion queries per day, GTI classifies files as either ...

Subscribe to McAfee Securing Tomorrow Blogs