Featured Blogs
The McAfee Americas Channel Promise
In my 26th year at McAfee, my fourth leading the Americas Channel Organization, I wanted to take a step back...
5 Digital Risks That Could Affect Your Kids This New School Year
Starting a new school year is both exciting and stressful for families today. Technology has magnified learning and connection opportunities...
DHCP Client Remote Code Execution Vulnerability Demystified
CVE-2019-0547 CVE-2019-0547 was the first vulnerability patched by Microsoft this year. The dynamic link library, dhcpcore.dll, which is responsible for...
Clop Ransomware
This new ransomware was discovered by Michael Gillespie on 8 February 2019 and it is still improving over time. This...
Be Wary of WhatsApp Messages Offering 1000GB of Free Data
Global messaging giant WhatsApp turned 10 years old this year. It’s not unusual for companies to provide loyal customers or...
The Twin Journey, Part 1
Summary and Introduction: The recent changes in Windows 10, aiming to add case sensitivity (CS) at directory level, have prompted...
Capital One Data Breach: How Impacted Users Can Stay More Secure
Capital One is one of the 10 largest banks based on U.S. deposits. As with many big-name brands, cybercriminals see...
Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423
In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft’s Jet Database Engine....
What Is Mshta, How Can It Be Used and How to Protect Against It
The not-so Usual Suspects There is a growing trend for attackers to more heavily utilize tools that already exist on...