Featured Blogs
MWC Preview: Tailoring Security to the Modern Connected Lifestyle
In 2018, we’re officially living in the “future” imagined by popular 80s movies. No, we still don’t have flying cars,...
DDoS Attacks in the Netherlands Reveal Teen Gamers on Troublesome Path
At the end of January, the Netherlands was plagued by distributed denial of service (DDoS) attacks targeting various financial institutions,...
New McAfee Report Reveals Identity Theft is the Most Expensive Form of Property Crime
Between Uber, Equifax, and a handful of others, the U.S. has witnessed major data breaches in the past year that...
Together We Are Forming a Powerful Alliance Against the Bad Guys
McAfee Security Innovation Alliance (SIA) is a technology ecosystem designed to assemble the world’s leading security innovations to form a...
Is Your Teen Using Tinder? Here’s What You Need to Know
Teens are curious. It’s fun to meet and date people they don’t see in the hallways every day. It feels...
How McAfee is Adapting to the Mobile Landscape with New Partnerships and Innovation
Mobile World Congress (MWC) 2018 is finally upon us, and mobile and security providers from around the world are in...
Key Mobile Threat Takeaways from the 2018 Mobile Threat Report
The term “mobile” has come to encompass a wide range of devices these days. Mobile devices have become much more...
McAfee Uncovers Operation Honeybee, a Malicious Campaign Targeting Humanitarian Aid Groups
This post was written with contributions from Jessica Saavedra-Morales, Thomas Roccia, and Asheer Malhotra. McAfee Advanced Threat Research analysts have...
How Hackers Bypassed an Adobe Flash Protection Mechanism
The number of Flash Player exploits has recently declined, due to Adobe’s introduction of various measures to strengthen Flash’s security....