Featured Blogs
The Rise of Deep Learning for Detection and Classification of Malware
Co-written by Catherine Huang, Ph.D. and Abhishek Karnik Artificial Intelligence (AI) continues to evolve and has made huge progress over the last decade. AI shapes our daily lives. Deep learning is a subset of techniques in AI that...
Chipotle’s Marketing Account Hacked: Protect Yourself From Phishing Lures
Over the past few years, food delivery apps have made it easy for people to get their favorite cuisines brought...
XLSM Malware with MacroSheets
Written by: Lakshya Mathur Excel-based malware has been around for decades and has been in the limelight in recent years. During the second half of 2020, we saw...
How to Protect Yourself From XLoader Malware
Picture this: you open your MacBook and see an email claiming to be from your favorite online store. In the email,...
7 Safety Tips to Schooling in a Digital World
This fall, many students are headed back-to-school full time. However, just as workplaces now accommodate for remote work, schools are...
The New McAfee: A Bold New World of Protection Online
This news has been some time in the making, and I’m terrifically excited to share it. As of July 27th, we take a...
Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems?
Co-written with Northwave’s Noël Keijzer. Executive Summary For a long time, ransomware gangs were mostly focused on Microsoft Windows operating...
It’s All About You: McAfee’s New All-Consumer Focus
This week, McAfee took an exciting new step in our journey—we are now a pure-play consumer company. What does that...
What is a VPN and Can it Hide My IP Address?
There’s a lot of misinformation about Virtual Private Networks, what they do, and the security benefits they offer. For this article, I’d like to do...
9 Tips to Help Kids Avoid Popular App Scams
There’s a lot of conversation going on right now around digital apps; only it’s not about TikTok or Twitch. Instead, it’s about the spike in the number...
My Journey from Intern to Principal Engineer
Written by Shuborno, Principal Engineer At McAfee, architects and engineers continuously have opportunities to make decisions that impact customers and...
How to Secure Your Smart Home: A Step-by-Step Guide
How many rooms in your home contain a smart device? From Peloton bikes to showerheads with Bluetooth speakers, smart home technology is rapidly making its way into every room in...
Fighting new Ransomware Techniques with McAfee’s Latest Innovations
In 2021 ransomware attacks have been dominant among the bigger cyber security stories. Hence, I was not surprised to see...
McAfee Partners with American Express to Provide Best-in-Class Security
With the increase in online activities due to the COVID-19 pandemic, consumers are potentially becoming exposed to more online threats,...
An Overall Philosophy on the Use of Critical Threat Intelligence
The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and...
REvil Ransomware Uses DLL Sideloading
This blog was written byVaradharajan Krishnasamy, Karthickkumar, Sakshi Jaiswal Introduction Ransomware attacks are one of the most common cyber-attacks among...
COVID-19 Vaccine Passports: 5 Security Tips for You and Your Family
Depending on where your travels take you, you might need a new passport—a COVID-19 vaccine passport. In an effort to kickstart travel...
Small Businesses Save Up to 60% in McAfee and Visa Partnership
Small business owners are getting a special deal on their online protection through a partnership between McAfee and Visa. With new ways of working creating online opportunities and risks for...
How to Make Telehealth Safer for a More Convenient Life Online
Among the many major shifts in lifestyle during the COVID-19 pandemic, the way we used healthcare was one of the...
The Future of Mobile in a Post-COVID World & How to Stay Secure
The COVID-19 pandemic forced many of us to quickly adjust to the new normal — case and point, admitted that...
Hancitor Making Use of Cookies to Prevent URL Scraping
This blog was written by Vallabh Chole & Oliver Devane Over the years, the cybersecurity industry has seen many threats...
Zloader With a New Infection Technique
This blog was written by Kiran Raj & Kishan N. Introduction In the last few years, Microsoft Office macro malware...
Microsoft Urges Customers to Update Windows as Soon as Possible
What happened Microsoft has shipped an emergency security update affecting most Windows users. This update partially addresses a security vulnerability known as PrintNightmare that could allow...
The Ultimate Guide to Safe Sharing Online
We live in a world that thrives on digital connectivity. According to We Are Social, Canadians are now spending half a day more...
New Ryuk Ransomware Sample Targets Webservers
Executive Summary Ryuk is a ransomware that encrypts a victim’s files and requests payment in Bitcoin cryptocurrency to release the...
The Future of Mobile: Trends from Mobile World Congress 2021
Today we wrap up Mobile World Congress (MWC) 2021. Whether you joined online or attended the hybrid conference in person, one...
Fuzzing ImageMagick and Digging Deeper into CVE-2020-27829
Introduction: ImageMagick is a hugely popular open source software that is used in lot of systems around the world. It...