Featured Blogs
CIOs: You need to have the cloud talk with your staff
CIOs, it is time to have a frank and open discussion with your staff. This conversation may be difficult or...
Clever Billing Fraud Applications on Google Play: Etinu
Authored by: Sang Ryol Ryu and Chanung Pak A new wave of fraudulent apps has made its way to the...
Clever Phishing Attacks Target Google, Yahoo, DHL Customers
Last week McAfee Labs received a phishing page that efficiently uses the CSS format of the Gmail login page and...
Clickbait and Switch: How AI Makes Disinformation Go Viral
Bad news travels quickly. Or so goes the old saying. Yet we do know this: disinformation and fake news spread...
ClickFix Deception: A Social Engineering Tactic to Deploy Malware
Authored by Yashvi Shah and Vignesh Dhatchanamoorthy McAfee Labs has discovered a highly unusual method of malware delivery, referred to...
Clicks & Cliques: How to Help Your Daughter Deal with Mean Girls Online
According to a new report released by the National Center for Education Statistics (NCES), mean girls are out in force online....
Clop Ransomware
This new ransomware was discovered by Michael Gillespie on 8 February 2019 and it is still improving over time. This...
CLOP Ransomware exploits MOVEit software
Authored by: Abhishek Karnik and Oliver Devane You may have heard recently in the news that several organizations, including banks,...
Cloud Adoption Is in the Forecast
This blog was written by Richard Steranka. McAfee recently released new research on the quickening pace of enterprise cloud adoption....
Cloud Clustering Vulnerable to Attacks
The authors thank John Fokker and Marcelo CaroVargas for their contributions and insights. In our upcoming talk at the Cloud...
Code Execution Technique Takes Advantage of Dynamic Data Exchange
Email phishing campaigns are a popular social engineering technique among hackers. The idea is simple: Craft an email that looks...
Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely
If you’re thinking about crypto, one of the first things you’ll want to do is get yourself a good wallet. ...
College Basketball Finals Shouldn’t Result in March Mayhem: 4 Security Tips to Stay Safe
March is in full swing, which can only mean we’re about to enter the mayhem that is the college basketball...
College Bound? 7 Important Technology Habits for Students
You’ve loved, shaped, and equipped your child to succeed in college and move in day is finally here. But there’s...
Combating Malware and Advanced Persistent Threats
In the past decade, the security industry has seen a constant rise in the volume of malware and attacks associated...
Combining The Old With The New
Combining The Old With The New “Mom look, that’s the app I was telling you about!” remarked my friend’s teen,...
Coming Home To Vote for Marriage Equality
By Chris, Localization Engineer Chris is a localization engineer for McAfee in Cork, Ireland, who is passionate about inclusivity for...
CompuCom Launches Cloud-Based Managed Service Powered by McAfee
This blog was written by Richard Steranka. Today, from Black Hat 2016 in Las Vegas, CompuCom announced the expansion of...