Featured Blogs
Multiple Java Exploits Hide in a Jar (File)
Exploits of the Java Runtime Environment (JRE) have been extensively used in drive-by-download toolkits such as Blackhole and Red Kit....
Multiplatform Fake AV Uses Different GUIs
Since the beginning of October we have seen a variant of fake antivirus malware that belongs to the FakeRean family...
Multi-tricks HiddenAds Malware
Thousands of HiddenAds Trojan Apps Masquerade as Google Play Apps The McAfee mobile research team has recently discovered a new...
Mr. Robot Gets Hacking Right. Here’s How
If you have an interest in cybersecurity and popular culture, do yourself a favor now: go watch Mr. Robot, USA...
Mr. Coffee with WeMo: Double Roast
McAfee Advanced Threat Research recently released a blog detailing a vulnerability in the Mr. Coffee Coffee Maker with WeMo. Please...
MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters
Every year, more and more words are making it into the English dictionary. The next one to make its debut...
Most Dangerous Celebrity 2020 Sweepstakes
McAfee “Most Famous to Most Dangerous to Search for Online” 2020 MDC Sweepstakes Terms and Conditions NO PURCHASE OR PAYMENT...
Most Dangerous Celebrities 2017: #RT2Win a Hollywood Worthy Prize
“Hey hey, you you!” Did you hear that we released our 2017 Most Dangerous Celebrities List? This year marks the...
Most Dangerous Celebrities 2016: #RT2Win a Red Carpet-Worthy Prize
Everybody loves some celebrity gossip once in a while. Whether you sift through tabloids in the checkout aisle, or bookmark...
