Featured Blogs
Catch Phish If You Can
There are some movies you can watch over and over again. For me, it’s “Catch Me If You Can,” Steven...
CelebGate: a Long, Dangerous List of Celebrities
During the past few days, the media has been abuzz with the massive celebrity photo leak nicknamed CelebGate 2014. The...
Celebrate International Women’s Day By Embracing a Career in Technology
This Sunday, we celebrate International Women’s Day, a global day for championing the social, economic, cultural, and political achievements of...
Celebrate National Download Day With This Safe Downloading Checklist
Happy Download Day! (Yes, there’s a day for that.) Today is an excellent day to share downloading best practices to...
Celebrate World Wide Web Day: The Evolution of Web Safety
The World Wide Web, invented in 1989 by Tim Berners-Lee, has undoubtedly made our lives more convenient in so many...
Celebrating Halloween – McAfee Style
By Dawson McPherson, Talent & Communications Coordinator Two weeks ago, I stepped into the McAfee Plano office with a mixture...
Celebrating International Day of Women and Girls in Science
Advice and Insights from some of McAfee’s brightest STEM leaders This International Day of Women and Girls in Science, #TeamMcAfee...
Celebrating multi-national cultures this Hispanic Heritage Month
Do you know the difference between Hispanic and Latino? What about the traditions that are important parts of the Hispanic...
Celebrating our partners across EMEA
This blog was written by David Small. Last week, our EMEA Channel Partner Summit took place in Mallorca. This year’s...
Celebrities Are Lures For Scammers
Through this guide, we aim to shed light on how scammers take advantage of the global fascination with celebrities to target their potential victims.
Cerber Ransomware Evades Detection With Many Components
This blog was co-written by Sapna Juneja. Cerber is a quickly evolving type of malware called crypto-ransomware. Cerber encrypts files...
Cerber Ransomware Now Hunts for Databases
Cerber is one of the most popular ransomware packages. It has upgraded itself to also target databases. It is...
Cerber Ransomware Updates Configuration File
This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the...
CES 2021: Highlights From the “Cleanest” Show Yet!
Typically, the International Consumer Electronics Show (CES) gives us a sense of where technology is going in the future. However,...
Chameleon: the Wi-Fi Virus That Hides in Plain Sight & Spreads Like a Cold
Recently, a group of researchers at the University of Liverpool successfully tested a new virus with a terrifying potential. It...
Change Your Password. World Password Day is 7 May!
We also say we want to be safe online. Yet sometimes our actions betray our words—especially if we’re using simple,...
Changing Passwords in a Post Heartbleed Bug World
From a home security standpoint, the main gatekeeper is the house key. It’s small, portable and fairly adept at keeping...
Chapter Preview: Ages 11 to 17 – From Tweens to Teens
For anyone who asks what happens during the tween through teen years, the best answer is probably, “What doesn’t happen?!”...