Featured Blogs
Recent Phishing Attacks Target Google Chrome Extensions, Spread Adware to 1 Million Users
Browser extensions help us out with our grammar, they allow us to video chat online, they even permit us to...
Red Kit an Emerging Exploit Pack
Exploit kits are toolkits that are used to build malware components such as binaries and scripts. They automate the exploitation...
Redline Stealer: A Novel Approach
Authored by Mohansundaram M and Neil Tyagi A new packed variant of the Redline Stealer trojan was observed in the...
Reimagining mobile security for the way we live our lives today, tomorrow, and beyond.
Online is a little different for everyone How do you connect online these days? I’ll give you an example from my...
Remote iPhone Jailbreak Using PDF Exploit Should Serve as Wake-Up Call
Like many iPhone users, I “jailbreak” my iPhone. I do this for many reasons, but mainly for console-level access and...
Remote Jackpot: Hacking ATMs
Isn’t it just everybody’s dream: to walk up to an ATM, swipe your card, get a flashy screen reading “We...
Remote Jeep Hacking Successful: Time to Patch Your Car?
This blog post was written by Bruce Snell. Next month I’ll be moving back to the US after a few...
Report Finds Some Health Apps Aren’t Healthy for Your Privacy
One of the big features in today’s Internet-of-Things-centric world is the ability to effortlessly track and record health-related data. In...
Report Highlights Enterprise Biometric Vulnerabilities, Opportunities
Authentication in the modern enterprise is becoming more difficult. The risks are rising, but adding more security controls can impede...
Report: Gaming Addiction is a Real Thing. So What Can Parents Do Next?
It’s one of my biggest parenting regrets to date: About a decade ago, I failed to put limits around my teen’s...
Reports of Online Predators on the Rise. How to Keep Your Kids Safe.
June is Internet Safety Month. And, with kids spending more time online, stepping up the public conversation about digital risks...
Research Reveals Americans’ Perceptions of Device Security Amidst CES 2020
From the Lifx Switch smart switch to the Charmin RollBot to Kohler Setra Alexa-connected faucets, CES 2020 has introduced new...
Research Shows Parents Need a Pat On the Back But There Is Still Work To Be Done
Sometimes as parents we need a little pat on the back and confirmation we’re doing something right. Well, the McAfee...
Researchers Follow the Breadcrumbs: The Latest Vulnerabilities in Windows’ Network Stack
The concept of a trail of breadcrumbs in the offensive security community is nothing new; for many years, researchers on...
Responses to Cybercrime in Japan and France
This week the Sorbonne University and the French Department of Justice hosted a meeting, the World and Development Institute (IMODEV) International...
Return of the Hack
As our world has evolved, so has our technology. And, as that technology has evolved, so has its consumption. Now...
Return to Workplace: Ready to Relaunch Your Career
By: Sheetal, Application Developer & Majy, IT Support McAfee offers a new program that offers professionals who dedicated extended time...
Revenge Posts on Social Media Could Land You in Jail
After a bad breakup, a scorned lover may choose to channel their anger through ice cream, a good cry, or...
