Featured Blogs
Fraudulent Adult Dating Services Turn 10 Years Old, Still Evolving
McAfee Mobile Research monitors adult one-click-fraud applications on Google Play that are targeted at Japanese users. Although the attackers appeared...
For some, accounting is more than just spreadsheets! Vernon’s McAfee Journey
Vernon has been our Manager of Technical Accounting for more than two years, but that doesn’t mean he’s busy with...
Floki Bot a Sensation With International Cybercriminals
Floki Bot, new financial malware, is popular with English-, Portuguese-, and Russian-speaking underground criminal markets, winning over cybercriminals with new...
Five Tips from McAfee’s Remote Workers
Whether you’re working from for the first time or a remote working veteran, you may be looking for some tips...
First 30 Days at McAfee: Pups at Work, VR and Pledge Wall
By Beth, HR Communication Specialist in Plano, Texas. For the last six consecutive years, The Dallas Morning News has recognized...
File-Hosting Site Turns Your File Into Adware
We recently received a sample from a customer and upon initial analysis it looked like a bundled software installer. Upon...
Fighting new Ransomware Techniques with McAfee’s Latest Innovations
In 2021 ransomware attacks have been dominant among the bigger cyber security stories. Hence, I was not surprised to see...
Fighting Mobile Phone Impersonation and Surveillance
Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased...
Farewell to the SHA-1 Hash Algorithm
Rest in peace SHA-1. Like all security controls, they are valuable only for a certain time. SHA-1, a legacy hashing...