Featured Blogs
10 Thoughtful (Free) Holiday Gifts to Give Your Friends Year ‘Round
Just a quick poll. What feelings do these digital scenarios evoke: being ghosted, getting trapped in a group text, being...
The Top Technology Takeaways From CES 2020
Another Consumer Electronics Show (CES) has come and gone. Every year, this trade show joins practically everyone in the consumer...
What CVE-2020-0601 Teaches Us About Microsoft’s TLS Certificate Verification Process
By: Jan Schnellbächer and Martin Stecher, McAfee Germany GmbH This week security researches around the world were very busy working...
What You Need to Know About the FedEx SMiShing Scam
You receive a text message saying that you have a package out for delivery. While you might feel exhilarated at...
How Chinese Cybercriminals Use Business Playbook to Revamp Underground
Preface Because of its longevity and technical sophistication, the Russian cybercriminal underground has long been the benchmark for threat researchers...
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I
For many years now I have been working and teaching in the field of digital forensics, malware analysis and threat...
Do I Need to Hide My IP Address?
New threats to our online privacy emerge every day, from relatively benign tracking of our activities for marketing purposes, to more invasive measures that can put our security at risk. This has led some people to wonder whether they should take steps to hide their IP address. In truth, it ...
SMBGhost – Analysis of CVE-2020-0796
The Vulnerability The latest vulnerability in SMBv3 is a “wormable” vulnerability given its potential ability to replicate or spread over...
How One McAfee Advanced Threat Researcher is Giving Back During COVID-19
There is great need all around us. During COVID-19 and this time of social distancing, many people are considering ways...