Featured Blogs
We Be Jammin’ – Bypassing Chamberlain myQ Garage Doors
The convenience that many IOT devices provide often persuades consumers away from thinking about possible security concerns. McAfee Advanced Threat Research recently investigated Chamberlain’s MyQ Hub, a “Universal” garage door automation platform.
Weaponized Medical Data as Damaging as Clinton’s Emails or Trump’s Videos
The 2016 presidential election in the United States will be remembered for a great many things. Never before in US...
WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies.
We’ve Been Hacked! Okay, I’ll Deal With It Next Week
That was the message I got from a CEO when we presented evidence that their organization had been compromised and...
What CVE-2020-0601 Teaches Us About Microsoft’s TLS Certificate Verification Process
By: Jan Schnellbächer and Martin Stecher, McAfee Germany GmbH This week security researches around the world were very busy working...
What Drives a Ransomware Criminal? CoinVault Developers Convicted
How often do we get a chance to learn what goes on in the minds of cybercriminals? Two members of...
What is a McAfee Internship Like? 10 Interns Share Perspectives
At McAfee, we foster meaningful internship experiences within our fast-paced world of cybersecurity. We know it’s the next generation that will build tomorrow’s technology solutions. McAfee interns make substantial contributions and are valued as global team members, joining our...
What Is Mshta, How Can It Be Used and How to Protect Against It
The not-so Usual Suspects There is a growing trend for attackers to more heavily utilize tools that already exist on...
What I’m Thankful for This Year: Combining Passion & Career
By Philip, Program Manager, People First Office Back in April, I started my new role at McAfee as the Program...
What’s in the Box?
2018 was another record-setting year in the continuing trend for consumer online shopping. With an increase in technology and efficiency,...
What’s in the Box? Part II: Hacking the iParcelBox
Package delivery is just one of those things we take for granted these days. This is especially true in the...
When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign
Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets. The Flowchart...
When the Digital Impacts the Physical
Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices…until they...
Which Cybersecurity Data Should You Trust?
Limitations of security data We are constantly battered by cybersecurity data, reports, and marketing collateral—and we shouldn’t treat all of this...
Why Am I Getting All These Notifications on my Phone?
Learn more about the Chrome notifications on Android mobile devices such as phones and tablets, and how McAfee Mobile Security protects users from malicious sites leveraging these notifications.
Why Does My Car Have Its Own Smartphone?
You would be surprised at the number of places you can find a GSM SIM card. Outside of your mobile phone,...
Why I Bring My Authentic Self to Work at McAfee
By Kristol, Sales Account Manager and President, McAfee African Heritage Community If you talked to me when I first started...
Why I’m Proud to Protect
At McAfee, we’re proud to protect. It’s part of our DNA. We’re all dedicated to keeping the world safe from...