Featured Blogs
Which Cybersecurity Data Should You Trust?
Limitations of security data We are constantly battered by cybersecurity data, reports, and marketing collateral—and we shouldn’t treat all of this...
Why Am I Getting All These Notifications on my Phone?
Learn more about the Chrome notifications on Android mobile devices such as phones and tablets, and how McAfee Mobile Security protects users from malicious sites leveraging these notifications.
Why Does My Car Have Its Own Smartphone?
You would be surprised at the number of places you can find a GSM SIM card. Outside of your mobile phone,...
Why I Bring My Authentic Self to Work at McAfee
By Kristol, Sales Account Manager and President, McAfee African Heritage Community If you talked to me when I first started...
Why I’m Proud to Protect
At McAfee, we’re proud to protect. It’s part of our DNA. We’re all dedicated to keeping the world safe from...
Why Process Reimaging Matters
As this blog goes live, Eoin Carroll will be stepping off the stage at Hack in Paris having detailed the...
Why Republic Day of India Matters to Me and McAfee
By Smriti, HR Partner At McAfee, we love to recognize and celebrate the traditions and holidays observed by our employees...
Wildfire Ransomware Extinguished by Tool From NoMoreRansom
McAfee and Kaspersky Lab, partners in the project NoMoreRansom, are pleased to announce today the availability of a decryption tool...
Win32/Syndicasec Used In Targeted Attacks Against Indian Organizations
During the last couple of months, we’ve observed several RTF exploits that target Indian organizations. The first RTF exploit was...
With Release of Windows 10, Questions About BitLocker Arise Again
This post was written by Ted Pan. For those of you who were around during the original release of Microsoft’s...
Women in Sales Part 1: Opportunities for Women Across Cybersecurity Sales
Collaborative, inclusive teams are what redefine cybersecurity solutions for every aspect of our connected world. At McAfee, women are making...
Women in Sales Part 2: Skilling up for a Career in Cybersecurity Sales
McAfee fosters an inclusive environment where we value varied life experiences. To showcase women who are making an impact and inspire others, we launched our Women in Sales Series. In Part 1, McAfee...
Women in Sales Part 3: Traits for Success in Cybersecurity Sales
At McAfee, women are finding the inclusiveness and tools to succeed in cybersecurity sales, a field often misconceived because of its technical background. They are doing...
Women in Sales Part 5: The Value of Support Networks and Inspiration
Women at McAfee are making powerful contributions to our sales efforts. Saleswomen from varying backgrounds share their unique perspectives in hopes of encouraging more women...
Worms Could Spread Like Zombies via Internet of Things
Security researchers recently created a proof-of-concept attack against Internet-connected lightbulbs, causing breached devices to infect their neighbors. The propagation...
Xirtem Worm Hides in CAB/SFX Files
W32/Xirtem@@MM is a fast-spreading and active worm, discovered in late 2008, that uses a variety of methods to propagate. The...
XLSM Malware with MacroSheets
Written by: Lakshya Mathur Excel-based malware has been around for decades and has been in the limelight in recent years. During the second half of 2020, we saw...
Yahoo Ads Serve Mobile Fake Alerts
“Android Armour,” a malicious knockoff of Armor For Android, has been circulating for some time with no end in sight, perhaps...