Featured Blogs
Three Reasons You Need a VPN
You know what a VPN is, but the question remains—why do you need a VPN? There’s one good reason. Your...
Three Lessons I’ve Learned Battling Cancer and Cybercriminals
By Celeste, Senior Principal Engineer With our people at the heart, we are McAfee As Chief Data Scientist, Senior Principal...
Threat Report: Don’t Join Blockchain Revolution Without Ensuring Security
On May 19 researchers discovered a series of vulnerabilities in the blockchain-based EOS platform that can lead to remote control...
Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack
This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...
Threat Actors Use Encrypted Office Binary Format to Evade Detection
This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...
Threat Actors Taking Advantage of FTX Bankruptcy
Authored by Oliver Devane It hasn’t taken malicious actors long to take advantage of the recent bankruptcy filing of FTX,...
Threat Actors Employ COM Technology in Shellcode to Evade Detection
COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...
Thoughts from the conference floor: securing the connected home
This blog post was written by Nick Viney. In my line of work, you read and hear a lot about...
This Year at Black Hat: Danger Drones and Thermostat Ransomware
This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it...
This World Password Day, Here’s How a Password Manager Can Simplify Your Life
Passwords: we entrust our most important data to these strings of letters, numbers, and special characters. So, we should make...
This Week in Scams: $16.6 Billion Lost, Deepfakes Rise, and Google Email Scams Emerge
Welcome to the first edition of This Week in Scams, a new weekly series from McAfee breaking down the latest...
This Valentine’s Day, Share Your Love, Not Your Personal Data
This blog post was written by Bruce Snell. Valentine’s Day is just around the corner, are you ready? Have you...
This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too
This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too Love is in the...
This Valentine’s Day Let Your Digital Life Take a Backseat
A couple of decades ago, Valentine’s Day was all about red roses, exchanging cards, dinner dates, hand-holding and whispering sweet...
This Holiday Season, Watch Out for These Cyber-Grinch Tricks Used to Scam Holiday Shoppers
McAfee threat researchers have identified several consumer brands and product categories most frequently used by cybercriminals to trick consumers into...
This Election Season, Be on the Lookout for AI-generated Fake News
It’s that time of year again: election season! You already know what to expect when you flip on the TV....
This Data Privacy Day Own Your Privacy, Even On Social Sites
One of the positive trends that we’ve seen in recent years is governments and users pressuring companies to simplify their...
Think Twice Before Trusting These 14 Android Apps with Your Login Information
In life, there are a handful of people that each of us truly trust – and can confide in fully....