Featured Blogs
My Adventures Hacking the iParcelBox
In 2019, McAfee Advanced Threat Research (ATR) disclosed a vulnerability in a product called BoxLock. Sometime after this, the CEO...
MWC Preview: Tailoring Security to the Modern Connected Lifestyle
In 2018, we’re officially living in the “future” imagined by popular 80s movies. No, we still don’t have flying cars,...
MWC 2019: Why 5G + Fortnite = a win-win for criminals
So apparently, the company behind Fortnite has so much cash that it’s forming a $100 million prize fund for upcoming...
MWC 2019: The Key to Establishing Digital Trust with Intelligent Connectivity
These days, it’s rare to walk into a home that doesn’t have a smart device in use. From voice assistants,...
MWC 2018: Takeaways on the Key Devices and Innovations
It’s hard to believe that MWC 2018 is already over! Though the event came and went in the blink of...
MWC 2017: What We Learned About the Mobile Landscape
MWC (Mobile World Congress) has come and gone yet again, and over the course of the four-day conference we’ve seen...
Multiple Java Exploits Hide in a Jar (File)
Exploits of the Java Runtime Environment (JRE) have been extensively used in drive-by-download toolkits such as Blackhole and Red Kit....
Multiplatform Fake AV Uses Different GUIs
Since the beginning of October we have seen a variant of fake antivirus malware that belongs to the FakeRean family...
Multi-tricks HiddenAds Malware
Thousands of HiddenAds Trojan Apps Masquerade as Google Play Apps The McAfee mobile research team has recently discovered a new...