Featured Blogs
Four of the coolest jobs in cybersecurity
This blog post was written by Nick Viney. With the rapid growth of the Internet of Things (IoT) and data...
Four Ways To Use AI Responsibly
Are you skeptical about mainstream artificial intelligence? Or are you all in on AI and use it all day, every...
France Gets Hit with Its Largest Data Breach Ever — What You Need to Know
Two massive data breaches in France have impacted roughly half the nation’s population. The data of an estimated 33 million...
Frankenstein Data: How Data Brokers Stitch Together—and Sell—Your Digital Self
Your digital life is being stitched together—one purchase, one search, one swipe at a time. Data brokers collect and combine...
Fraudulent Adult Dating Services Turn 10 Years Old, Still Evolving
McAfee Mobile Research monitors adult one-click-fraud applications on Google Play that are targeted at Japanese users. Although the attackers appeared...
Fraudulent Apps that Automatically Charge you Money Spotted in Google Play
Google’s Android operating system has been a boon for the average consumer. No other operating system has given so much...
Free Ransomware Available on Dark Web
The McAfee Advanced Threat Research team recently analyzed a ransomware-as-a-service threat that is available for free and without registration. This malware...
Free Wi-Fi in the Big Apple
This blog was written by Bruce Snell. I was in New York City last June and had a morning free...
French Magazine Suffers Web Hack, Firebombing
To celebrate the recent victory of the Tunisian Islamist party, the French satirical magazine “Charlie Hebdo” published a special issue...
Frequent Fortnite Player? 4 Tips to Combat the New Attack on User Accounts
Epic Games’ Fortnite has risen in popularity rapidly since its debut, and cybercriminals have leveraged that popularity to enact a handful...
Frequently Asked Questions About Identity Theft
The more you know about identity theft, the better prepared you will be to prevent it from happening to you. Here are some commonly asked questions about identity theft.
From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta
Management. Control. It seems that you can’t stick five people in a room together without one of them trying to...
From Cyberbullying to AI-Generated Content – McAfee’s Research Reveals the Shocking Risks
The landscape of online threats targeting children has evolved into a complex web of dangers that extend far beyond simple...
From Election Day to Inauguration: How Cybersecurity Safeguards Democracy
Inauguration Day has come and gone, and the peaceful transfer of power couldn’t have happened without the intricate systems that...
From Email to RAT: Deciphering a VB Script-Driven Campaign
Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized by obfuscated Visual...
From Internet to Internet of Things
Thirty years ago, Tim Berners-Lee set out to accomplish an ambitious idea – the World Wide Web. While most of...
From Military Kid to Product Marketing: My McAfee Journey
Employee Spotlight: Meet Jovohn! From military beginnings to mobile security champion, meet Jovohn, our passionate Product Marketer and MAHC President....
From Smart Shoes to Safe Routers: Innovation Shines Bright at CES 2017
CES 2017 (the Consumer Electronics Show) has come and gone once again, bringing with it the newest wearables, state-of-the-art tech...
From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats
Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as “Asynchronous Remote Access Trojan,” represents a highly sophisticated malware...
From the Cloud to Drones: Threat Predictions for 2017
2016 has been quite the year. From widespread IoT attacks, to ransomware campaigns that extract millions of dollars, cyberthreats have...
From the Ground Up: How the Cars of the Future Will Be Secured
Autonomous systems are doing wonders for us, whether it be in factory manufacturing or recommending where you go to get...
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee March is Women’s History Month and International...
Further Analysis of WannaCry Ransomware
McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its...
Fuzzing ImageMagick and Digging Deeper into CVE-2020-27829
Introduction: ImageMagick is a hugely popular open source software that is used in lot of systems around the world. It...
Game Golf Exposure Leaves Users in a Sand Trap of Data Concerns
Apps not only provide users with a form of entertainment, but they also help us become more efficient or learn...
Game Over! Malicious Minecraft Character Skins Infect Over 50,000 Accounts
Video games allow users to become a whole new persona, to experience imaginary worlds, and live out scenarios that are...
GameOver Zeus/Cryptolocker: Am I Still Infected?
It has been two weeks since the announcement by multiple global law enforcement agencies regarding the takedown of the communications...
