Featured Blogs
This World Password Day, Here’s How a Password Manager Can Simplify Your Life
Passwords: we entrust our most important data to these strings of letters, numbers, and special characters. So, we should make...
This Year at Black Hat: Danger Drones and Thermostat Ransomware
This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it...
Thoughts from the conference floor: securing the connected home
This blog post was written by Nick Viney. In my line of work, you read and hear a lot about...
Threat Actors Employ COM Technology in Shellcode to Evade Detection
COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...
Threat Actors Taking Advantage of FTX Bankruptcy
Authored by Oliver Devane It hasn’t taken malicious actors long to take advantage of the recent bankruptcy filing of FTX,...
Threat Actors Use Encrypted Office Binary Format to Evade Detection
This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...
Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack
This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...
Threat Report: Don’t Join Blockchain Revolution Without Ensuring Security
On May 19 researchers discovered a series of vulnerabilities in the blockchain-based EOS platform that can lead to remote control...
Three Lessons I’ve Learned Battling Cancer and Cybercriminals
By Celeste, Senior Principal Engineer With our people at the heart, we are McAfee As Chief Data Scientist, Senior Principal...
Three Reasons You Need a VPN
You know what a VPN is, but the question remains—why do you need a VPN? There’s one good reason. Your...
Three Signs Your Teen May Be Sexting and What to Do About It
I will be the first to confess that sometimes when I look at my kids, my eyes do not work....
Three Words Every Parent Needs to Know
Have you noticed that commonplace words don’t quite mean what they used to? It’s a subtle but alarming shift...
TikTok Challenge, Hoop App, and Other Headlines You May Have Missed
Digital news that affects families seems to be dominating the headlines these days. To keep parents in the know, here...
TikTok Update: Dangerous Viral Challenges & Age Restrictions
TikTok Update: Dangerous Viral Challenges & Age Restrictions It’s popular. It’s uplifting. It’s creative. It’s entertaining. It can also be...
Time to make your Kids aware of Digital Fraud?
Long ago I watched a movie where the hero returned home after a harrowing experience only to find that an...
Time to Take a Good, Hard Look at Your Cybersecurity Health
What happens when your livelihood is at stake, thanks to someone stealing your identity or draining your account? The real-life...
Timeless Principles to Help Your Child Develop Social Superpowers
“You can make more friends in two months by becoming interested in other people than you can in two years...
Timeline of Bitcoin Events Demonstrates Online Currency’s Volatility
The buzz about Bitcoin has moved from online circles to mainstream media sources. Last week’s news of the collapse of...