Featured Blogs
Imposter Netflix Chrome Extension Dupes 100k Users
Authored by Oliver Devane, Vallabh Chole, and Aayush Tyagi McAfee has recently observed several malicious Chrome Extensions which, once installed,...
Improve Protection Against Cyberattacks Through Shared Threat Intelligence
This blog post was written by Rick Simon. At the RSA Conference 2016 in San Francisco, Chris Young, GM and...
Improve Your Google Account Privacy
This blog was written by Bruce Snell. I’ve had a number of questions come in lately via email, social media...
In 2019 the Threat is “Everywhere Malware”, Not just Mobile Malware
This time last year, we said that 2018 would be the year of mobile malware. Today at MWC, we’re calling...
In Memory of Peter Szor
Nov. 20: Update with details of memorial service at the end of this post. Earlier this week the security industry...
In NTDLL I Trust – Process Reimaging and Endpoint Security Solution Bypass
Process Reimaging Overview The Windows Operating System has inconsistencies in how it determines process image FILE_OBJECT locations, which impacts non-EDR...
Inclusion Drives Innovation: An Employee’s Perspective on Being Differently Abled
By Karla Jackson, Digital Media Specialist, McAfee “With Our People at The Heart, We Are McAfee.” If you make your...
Independent Lab Tests Show that McAfee Stops Malware Dead in Its Tracks
Concerned about ransomware? McAfee stops it dead in its tracks. Newly published findings from the independent labs at AV-TEST show...
Indian Digital Citizens Need to Better Balance Their Device Use and Manage Online Safety
As Bryan Adams croons in the background (Everything I do) I do it for you…. and you give the last...
