Featured Blogs
Dopple-ganging up on Facial Recognition Systems
Co-authored with Jesse Chick, OSU Senior and Former McAfee Intern, Primary Researcher. Special thanks to Dr. Catherine Huang, McAfee Advanced...
Call an Exorcist! My Robot’s Possessed!
Overview As part of our continued goal of helping developers provide safer products for businesses and consumers, we here at...
Robot Character Analysis Reveals Trust Issues
Retired Marine fighter pilot and Top Gun instructor Dave Berke said “Every single thing you do in your life, every...
Women in Sales Part 3: Traits for Success in Cybersecurity Sales
At McAfee, women are finding the inclusiveness and tools to succeed in cybersecurity sales, a field often misconceived because of its technical background. They are doing...
Vulnerability Discovery in Open Source Libraries Part 1: Tools of the Trade
Executive Summary Open source has become the foundation for modern software development. Vendors use open source software to stay competitive...
On Drovorub: Linux Kernel Security Best Practices
Intro In a U.S. government cyber security advisory released today, the National Security Agency and Federal Bureau of Investigation warn...
Women in Sales Part 5: The Value of Support Networks and Inspiration
Women at McAfee are making powerful contributions to our sales efforts. Saleswomen from varying backgrounds share their unique perspectives in hopes of encouraging more women...
Vulnerability Discovery in Open Source Libraries: Analyzing CVE-2020-11863
Open Source projects are the building blocks of any software development process. As we indicated in our previous blog, as...
How Piyush’s remarkable efforts ignited a larger impact of giving back
At McAfee, we support team members who are passionate about giving back. You are encouraged and empowered to make a substantial impact in improving our community and volunteering to help others. ...
Securing Space 4.0 – One Small Step or a Giant Leap? Part 2
McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and...
Securing Space 4.0 – One Small Step or a Giant Leap? Part 1
McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and...
Our Experiences Participating in Microsoft’s Azure Sphere Bounty Program
From June to August, part of the McAfee Advanced Threat Research (ATR) team participated in Microsoft’s Azure Sphere Research Challenge. Our research resulted...
Celebrating multi-national cultures this Hispanic Heritage Month
Do you know the difference between Hispanic and Latino? What about the traditions that are important parts of the Hispanic...
CVE-2020-16898: “Bad Neighbor”
CVE-2020-16898: “Bad Neighbor” CVSS Score: 8.8 Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C Overview Today, Microsoft announced a critical vulnerability in the Windows IPv6 stack,...
Your Smart Coffee Maker is Brewing Up Trouble
A smart coffee maker, like other smart appliances, connects to your home network, offering convenience features such as scheduling brew times, remote start, and customization of your coffee preferences. However, this connectivity also opens the door to potential cybersecurity threats.
Short-URL Services May Hide Threats
Short-URL services have emerged as a crucial part of the way we use the Internet. With the increasing use of...
Spotlighting McAfee’s Women in Technology Scholarship Recipients
Working at McAfee is so much more than fighting off cyber-attacks; it’s also about learning valuable life lessons and fostering...
Top 5 Things to Know About Recent IoT Attacks
While the IoT offers tremendous benefits, such as allowing users to monitor their homes or check the contents of their refrigerators remotely, it also presents a significant risk. For hackers, each IoT device represents a potential recruit for their bot armies.