Featured Blogs
A New Android Banking Trojan Masquerades as Utility and Banking Apps in India
Authored by Dexter Shin Over the years, cyber threats targeting Android devices have become more sophisticated and persistent. Recently, McAfee...
A New Program for Your Peloton – Whether You Like It or Not
Executive Summary The McAfee Advanced Threat Research team (ATR) is committed to uncovering security issues in both software and hardware to help developers...
A New Security Age Needs a New Approach to Security
Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption,...
A Parent’s Guide to ChatGPT
ChatGPT is, without doubt, the biggest tech story of the year. It’s created debate in schools and universities, made history...
A Parent’s Guide To The Metaverse – Part One
We’ve all heard about the Metaverse. And there’s no doubt it has certainly captured the attention of the world’s biggest...
A Parent’s Guide To The Metaverse – Part Two
Welcome back to part 2 of my Metaverse series. If you are after tips and strategies to help your kids...
A Parent’s Guide to TikTok
Finding someone who hasn’t heard of TikTok in 2022 would be quite the achievement. As one of the most popular...
A Quick Analysis of the Flash Player Opcode-Verifying Code Execution Vulnerability
On October 12, McAfee Labs learned of proof-of-concept code exploiting a newly patched Flash Player vulnerability. Adobe had patched this...
A Quick Guide to ‘Zero-Day Threats’ and How They Affect You
If you’re looking for a cybersecurity term that sounds intimidating and impressive to those who aren’t familiar with the field,...
