Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

Dopple-ganging up on Facial Recognition Systems

Co-authored with Jesse Chick, OSU Senior and Former McAfee Intern, Primary Researcher. Special thanks to Dr. Catherine Huang, McAfee Advanced...

McAfee Labs

Call an Exorcist! My Robot’s Possessed!

Overview As part of our continued goal of helping developers provide safer products for businesses and consumers, we here at...

McAfee Labs

Robot Character Analysis Reveals Trust Issues

Retired Marine fighter pilot and Top Gun instructor Dave Berke said “Every single thing you do in your life, every...

Life at McAfee

Women in Sales Part 3: Traits for Success in Cybersecurity Sales

At McAfee, women are finding the inclusiveness and tools to succeed in cybersecurity sales, a field often misconceived because of its technical background. They are doing...

McAfee Labs

Vulnerability Discovery in Open Source Libraries Part 1: Tools of the Trade

Executive Summary Open source has become the foundation for modern software development. Vendors use open source software to stay competitive...

McAfee Labs

On Drovorub: Linux Kernel Security Best Practices

Intro In a U.S. government cyber security advisory released today, the National Security Agency and Federal Bureau of Investigation warn...

Life at McAfee

Women in Sales Part 5: The Value of Support Networks and Inspiration

Women at McAfee are making powerful contributions to our sales efforts. Saleswomen from varying backgrounds share their unique perspectives in hopes of encouraging more women...

McAfee Labs

Vulnerability Discovery in Open Source Libraries: Analyzing CVE-2020-11863

Open Source projects are the building blocks of any software development process. As we indicated in our previous blog, as...

Life at McAfee

How Piyush’s remarkable efforts ignited a larger impact of giving back

At McAfee, we support team members who are passionate about giving back. You are encouraged and empowered to make a substantial impact in improving our community and volunteering to help others. ...

McAfee Labs

Securing Space 4.0 – One Small Step or a Giant Leap? Part 2

McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and...

McAfee Labs

Securing Space 4.0 – One Small Step or a Giant Leap? Part 1

McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and...

McAfee Labs

Our Experiences Participating in Microsoft’s Azure Sphere Bounty Program

From June to August, part of the McAfee Advanced Threat Research (ATR) team participated in Microsoft’s Azure Sphere Research Challenge.  Our research resulted...

Life at McAfee

Celebrating multi-national cultures this Hispanic Heritage Month

Do you know the difference between Hispanic and Latino? What about the traditions that are important parts of the Hispanic...

McAfee Labs

CVE-2020-16898: “Bad Neighbor”

CVE-2020-16898: “Bad Neighbor” CVSS Score: 8.8 Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C Overview Today, Microsoft announced a critical vulnerability in the Windows IPv6 stack,...

McAfee Labs

Your Smart Coffee Maker is Brewing Up Trouble

A smart coffee maker, like other smart appliances, connects to your home network, offering convenience features such as scheduling brew times, remote start, and customization of your coffee preferences. However, this connectivity also opens the door to potential cybersecurity threats.

McAfee Labs

Short-URL Services May Hide Threats

Short-URL services have emerged as a crucial part of the way we use the Internet. With the increasing use of...

Life at McAfee

Spotlighting McAfee’s Women in Technology Scholarship Recipients

Working at McAfee is so much more than fighting off cyber-attacks; it’s also about learning valuable life lessons and fostering...

McAfee Labs

Top 5 Things to Know About Recent IoT Attacks

While the IoT offers tremendous benefits, such as allowing users to monitor their homes or check the contents of their refrigerators remotely, it also presents a significant risk. For hackers, each IoT device represents a potential recruit for their bot armies.

Subscribe to McAfee Securing Tomorrow Blogs

Back to top