Featured Blogs
What is a Virus?
Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses,...
What Is a Trojan?
You may vaguely remember reading Virgil’s epic poem “Aeneid” back when you were in school. The story of Odysseus and...
What Is a Trojan Horse?
One of history’s great literary classics is Homer’s Iliad, which tells the story of the Trojan horse—the wooden horse that...
What is a Rootkit?
A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit...
What is a Remote Administration Tool (RAT)?
Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I...
What is a Potentially Unwanted Program (PUP)?
Whether you’re an animal person or not, you have to admit that puppies are pretty darn cute. So cute that...
What Is a Password Manager?
Many of us rely on passwords to secure our digital devices and online accounts, from our personal computers and mobile...
What is a McAfee Internship Like? 10 Interns Share Perspectives
At McAfee, we foster meaningful internship experiences within our fast-paced world of cybersecurity. We know it’s the next generation that will build tomorrow’s technology solutions. McAfee interns make substantial contributions and are valued as global team members, joining our...
What is a Man-in-the-Middle Attack?
There’s a reason why most people feel uncomfortable about the idea of someone eavesdropping on them—the eavesdropper could possibly overhear...