Featured Blogs
Coming Home To Vote for Marriage Equality
By Chris, Localization Engineer Chris is a localization engineer for McAfee in Cork, Ireland, who is passionate about inclusivity for...
Combining The Old With The New
Combining The Old With The New “Mom look, that’s the app I was telling you about!” remarked my friend’s teen,...
Combating Malware and Advanced Persistent Threats
In the past decade, the security industry has seen a constant rise in the volume of malware and attacks associated...
College Bound? 7 Important Technology Habits for Students
You’ve loved, shaped, and equipped your child to succeed in college and move in day is finally here. But there’s...
College Basketball Finals Shouldn’t Result in March Mayhem: 4 Security Tips to Stay Safe
March is in full swing, which can only mean we’re about to enter the mayhem that is the college basketball...
Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely
If you’re thinking about crypto, one of the first things you’ll want to do is get yourself a good wallet. ...
Code Execution Technique Takes Advantage of Dynamic Data Exchange
Email phishing campaigns are a popular social engineering technique among hackers. The idea is simple: Craft an email that looks...
Cloud Clustering Vulnerable to Attacks
The authors thank John Fokker and Marcelo CaroVargas for their contributions and insights. In our upcoming talk at the Cloud...
Cloud Adoption Is in the Forecast
This blog was written by Richard Steranka. McAfee recently released new research on the quickening pace of enterprise cloud adoption....