Featured Blogs
McAfee Defenders Blog: Reality Check for your Defenses
Welcome to reality Ever since I started working in IT Security more than 10 years ago, I wondered, what helps...
Is the Clubhouse App a Safe Place for Kids to Hangout?
Is the Clubhouse App a Safe Place for Kids to Hangout? Most of us have fond summer memories of hanging...
Prioritizing Security in a Remote Learning Environment
Prioritizing Security in a Remote Learning Environment Learning environments are not what they used to be, and as educational institutions...
McAfee Defender’s Blog: Cuba Ransomware Campaign
Cuba Ransomware Overview Over the past year, we have seen ransomware attackers change the way they have responded to organizations...
McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware
Executive Summary Cuba ransomware is an older ransomware, that has recently undergone some development. The actors have incorporated the leaking of victim data to increase its impact...
How to Quickly Remove Malware From an iPhone
For the most part, iPhones are well-protected devices — but they aren’t immune to malware attacks. These attacks range from...
What Is a Password Manager?
Many of us rely on passwords to secure our digital devices and online accounts, from our personal computers and mobile...
What Is a Trojan?
You may vaguely remember reading Virgil’s epic poem “Aeneid” back when you were in school. The story of Odysseus and...
BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain
Recently, the McAfee Mobile Research Team uncovered several new variants of the Android malware family BRATA being distributed in Google...