Featured Blogs
McAfee Defender’s Blog: NetWalker
Building Adaptable Security Architecture Against NetWalker NetWalker Overview The NetWalker ransomware, initially known as Mailto, was first detected in August...
Special Delivery: Criminals Posing as Amazon Are Out to Steal User’s Data
One of the joys of online shopping is instant gratification – your purchases arrive on your doorstep in just a few...
My Experience as a Finance Intern at McAfee for Summer 2020
By: Nilisha, Finance Intern, Plano, TX, United States Amidst this global pandemic, I was fortunate enough to have the opportunity...
Ripple20 Critical Vulnerabilities – Detection Logic and Signatures
This document has been prepared by McAfee Advanced Threat Research in collaboration with JSOF who discovered and responsibly disclosed the...
Call an Exorcist! My Robot’s Possessed!
Overview As part of our continued goal of helping developers provide safer products for businesses and consumers, we here at...
Robot Character Analysis Reveals Trust Issues
Retired Marine fighter pilot and Top Gun instructor Dave Berke said “Every single thing you do in your life, every...
Women in Sales Part 3: Traits for Success in Cybersecurity Sales
At McAfee, women are finding the inclusiveness and tools to succeed in cybersecurity sales, a field often misconceived because of its technical background. They are doing...
Cyberbullying’s Impact on Both Society and Security
More than half of children say that a cyberbully targeted them online. That disquieting stat comes from our recent global...
What Security Means to Elders
What Security Means to Elders Recently, we conducted a survey of 600 families and professionals in the U.S. to better...