Featured Blogs
Understanding Online Trolls and How to Deal with Them
Imagine, if you will, a person who goes online each day with the sole mission of triggering confrontation, provoking conflict,...
CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server
CVSS Score: 9.8 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Overview Microsoft released a patch today for a critical vulnerability (CVE-2020-17051) in the Windows NFSv3 (Network File System) server. NFS is typically...
Honoring Our Brave Military Veterans from the McAfee Community
Paying Tribute November 11 marks Veterans Day and Remembrance Day. It is a time for us to come together and...
What You Need to Know About Among Us
Among Us – one of the Most Popular Online Game of 2020 If you have teens and you haven’t yet...
Pickpocketing – Digital Style
Gone are the days when thieves would physically steal your wallet. Instead, they are using sophisticated techniques to steal your personal information and drain your bank accounts without you even realizing it. This article aims to shed light on digital pickpocketing, its impacts on your digital assets, and measures to ...
Are You Forwarding Jokes Or Spam?
With the advent of messaging and social media applications, sharing jokes or memes has become increasingly frequent and convenient. While we often perceive this as harmless fun, it’s essential to address a question that we don’t ask ourselves often enough: Are we forwarding jokes or inadvertently distributing spam?
5 Ways to Safeguard Your Child’s Instagram Bio
Keeping your child safe online is a growing concern for many parents. However, there are ways you can help safeguard your child’s Instagram bio and enhance their online safety. Here are 5 tips to consider.
How To Tell If Your Smart TV Spying on You
In a chilling echo of George Orwell’s dystopian novel 1984, it’s possible that Big Brother – or in this case,...
Helping Your Family Combat Digital Misinformation
Helping Your Family Combat Digital Misinformation If 2020 has taught us anything, it’s that our ability to think critically about...
Two-Factor vs. Multi-Factor Authentication: What’s the Difference?
This article breaks down the forms of authentication, explaining how they work and how they can enhance online information security.
Beware of Malicious Mobile Apps
With the surge in the usage of mobile phones, there has been a concurrent increase in malicious activities targeting these devices. One common technique used by hackers is to corrupt legitimate applications. Android devices, in particular, see increases in malware targeting mobile phones year by year.
One Team Member Selflessly Provides Relief to COVID-19’s Front Line
By: Heiko, Senior Security Engineer, Germany I never could have imagined that what started as a national duty to volunteer...
Operation North Star: Behind The Scenes
Executive Summary It is rare to be provided an inside view on how major cyber espionage campaigns are conducted within...
Operation North Star: Summary Of Our Latest Analysis
McAfee’s Advanced Threat Research (ATR) today released research that uncovers previously undiscovered information on how Operation North Star evaluated its...
Why Does My Phone Get Hot?
Overheating is a common issue in mobile devices, but it often raises alarms among users. This concern is usually unnecessary, as there are several common and easily resolvable reasons why phones get hot. However, it is essential to cool down an excessively hot device promptly to prevent it from overheating ...
How Extremist Groups Target Teens Online
With the reality of the digital age, the internet has become a vital part of our daily lives. While it offers immense benefits, the online world also has its potential risks. One such alarming issue involves extremist groups targeting impressionable teenagers online.
Top 5 Most Dangerous Email Subject Lines
In this article, we delve deeper into the tactic that is a favorite among cybercriminals – ‘phishing‘ via emails. We focus on the trickiest and most dangerous email subject lines that have been commonly used in worldwide phishing emails. Recognizing these ‘ baits’ can be your first step towards safeguarding ...
Top 5 Things to Know About Recent IoT Attacks
While the IoT offers tremendous benefits, such as allowing users to monitor their homes or check the contents of their refrigerators remotely, it also presents a significant risk. For hackers, each IoT device represents a potential recruit for their bot armies.
Parents: Are Your Kids Ignoring the Danger of Dating Apps?
As a parent, you might feel caught in a dilemma. On one hand, you want to respect your teen’s privacy and independence. On the other, you worry about the potential dangers lurking behind these digital platforms. This article aims to shed light on the risks associated with teenage use of ...
Weak Passwords Can Cost You Everything
The importance of having strong, unique passwords cannot be overstated. However, most individuals tend to use weak passwords or reuse the same password over and over, exposing their digital assets to potential hackers.
The Mobile Web vs. Native Apps
The debate between the mobile web and native apps has become increasingly relevant, with each approach offering unique advantages and disadvantages. This article aims to provide a comprehensive comparison between mobile web and native apps, with a particular emphasis on how each can impact your online safety.
My Child Wants a Phone. Should I Say ‘Yes’?
There are several factors to consider before taking this significant decision. Apart from their age, their maturity level, technology habits, and your gut instinct should be the primary considerations.
Election 2020: Lookout for Fake News Before and After the Election
Election 2020: Keep on the Lookout for Fake News Before and After the Election As the news and conversations leading...
US-B Careful: Public iPhone Chargers Lie in Wait
It is common knowledge that connecting your devices to public Wi-Fi can expose them to potential malware and other security risks. But have you ever considered the dangers that might be lurking within public USB chargers?
Cyber Monday: Protect Yourself and Your Family from Online Shopping Scams
The eagerly awaited holiday sales such as Black Friday and Cyber Monday are just around the corner. These tips will help you avoid falling prey to online scams, thereby ensuring that you keep your finances safe during this shopping season.
Black Friday and Cyber Monday Scams: Beware of the Pitfalls
With the shopping bonanzas of Black Friday and Cyber Monday comes a flurry of deals and offers, some of which are too good to be true. Unfortunately, the latter instances often become scams run by fraudsters seeking to take advantage of the shopping frenzy.
Spotlighting McAfee’s Women in Technology Scholarship Recipients
Working at McAfee is so much more than fighting off cyber-attacks; it’s also about learning valuable life lessons and fostering...