Featured Blogs
10 Thoughtful (Free) Holiday Gifts to Give Your Friends Year ‘Round
Just a quick poll. What feelings do these digital scenarios evoke: being ghosted, getting trapped in a group text, being...
The Top Technology Takeaways From CES 2020
Another Consumer Electronics Show (CES) has come and gone. Every year, this trade show joins practically everyone in the consumer...
What CVE-2020-0601 Teaches Us About Microsoft’s TLS Certificate Verification Process
By: Jan Schnellbächer and Martin Stecher, McAfee Germany GmbH This week security researches around the world were very busy working...
What You Need to Know About the FedEx SMiShing Scam
You receive a text message saying that you have a package out for delivery. While you might feel exhilarated at...
How Chinese Cybercriminals Use Business Playbook to Revamp Underground
Preface Because of its longevity and technical sophistication, the Russian cybercriminal underground has long been the benchmark for threat researchers...
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I
For many years now I have been working and teaching in the field of digital forensics, malware analysis and threat...
Do I Need to Hide My IP Address?
New threats to our online privacy emerge every day, from relatively benign tracking of our activities for marketing purposes, to more invasive measures that can put our security at risk. This has led some people to wonder whether they should take steps to hide their IP address. In truth, it ...
SMBGhost – Analysis of CVE-2020-0796
The Vulnerability The latest vulnerability in SMBv3 is a “wormable” vulnerability given its potential ability to replicate or spread over...
How One McAfee Advanced Threat Researcher is Giving Back During COVID-19
There is great need all around us. During COVID-19 and this time of social distancing, many people are considering ways...
Internet Privacy: Tips & Tricks for Staying Secure Online
How much value do you place on your personal privacy? You would never leave your wallet on a public park...
25 Amazing Quotes To Inspire You This Fathers Day
Today’s blog post is going to take a little detour off the main road. We’re going to pause from gulping...
Top 10 Tips To Stay Safe Online
With hacks, scams, cybercriminals, malware and more, the internet can feel like a dangerous place these days. And, the recent...
Women in Sales Part 1: Opportunities for Women Across Cybersecurity Sales
Collaborative, inclusive teams are what redefine cybersecurity solutions for every aspect of our connected world. At McAfee, women are making...
Dopple-ganging up on Facial Recognition Systems
Co-authored with Jesse Chick, OSU Senior and Former McAfee Intern, Primary Researcher. Special thanks to Dr. Catherine Huang, McAfee Advanced...
How Safe Is Your Android PIN Code?
Your Android PIN code is a critical aspect that protects your phone data from unauthorized access. But how safe is this four-digit code? This article aims to demystify this question and offers a comprehensive guide on the safety of Android PIN codes.
Keeping Virtual Play Dates, Hangouts, and Video Chats Safe for Everyone
While virtual playdates, hangouts, and video chats provides an excellent solution for children to interact with their peers, it has also opened up a new avenue for potential risks and dangers. In this article, we will provide some essential strategies for maintaining a secure and enjoyable online social environment for ...
Two-Factor vs. Multi-Factor Authentication: What’s the Difference?
This article breaks down the forms of authentication, explaining how they work and how they can enhance online information security.
The Wearable Future Is Hackable. Here’s What You Need To Know
Quick mental math challenge: How many Apple Watches can you buy with $118 billion dollars? If you guessed around 296...