Featured Blogs
Women in Sales Part 3: Traits for Success in Cybersecurity Sales
At McAfee, women are finding the inclusiveness and tools to succeed in cybersecurity sales, a field often misconceived because of its technical background. They are doing...
Robot Character Analysis Reveals Trust Issues
Retired Marine fighter pilot and Top Gun instructor Dave Berke said “Every single thing you do in your life, every...
Call an Exorcist! My Robot’s Possessed!
Overview As part of our continued goal of helping developers provide safer products for businesses and consumers, we here at...
Dopple-ganging up on Facial Recognition Systems
Co-authored with Jesse Chick, OSU Senior and Former McAfee Intern, Primary Researcher. Special thanks to Dr. Catherine Huang, McAfee Advanced...
Ripple20 Critical Vulnerabilities – Detection Logic and Signatures
This document has been prepared by McAfee Advanced Threat Research in collaboration with JSOF who discovered and responsibly disclosed the...
My Experience as a Finance Intern at McAfee for Summer 2020
By: Nilisha, Finance Intern, Plano, TX, United States Amidst this global pandemic, I was fortunate enough to have the opportunity...
Special Delivery: Criminals Posing as Amazon Are Out to Steal User’s Data
One of the joys of online shopping is instant gratification – your purchases arrive on your doorstep in just a few...
McAfee Defender’s Blog: NetWalker
Building Adaptable Security Architecture Against NetWalker NetWalker Overview The NetWalker ransomware, initially known as Mailto, was first detected in August...
Take a “NetWalk” on the Wild Side
Executive Summary The NetWalker ransomware, initially known as Mailto, was first detected in August 2019. Since then, new variants were...
How to Keep Remote Learning Pod Students Safe Online
The upheaval of 2020 has forced us all to reimagine familiar pathways, and parents are no exception. Cautious about sending...
Smartphone Alternatives for Free-Ranging Kids
Smartphone Alternatives for Free-Ranging Kids A popular topic in our blogs is “when to buy a child a smartphone,” and...
Women in Sales Part 2: Skilling up for a Career in Cybersecurity Sales
McAfee fosters an inclusive environment where we value varied life experiences. To showcase women who are making an impact and inspire others, we launched our Women in Sales Series. In Part 1, McAfee...
What is a McAfee Internship Like? 10 Interns Share Perspectives
At McAfee, we foster meaningful internship experiences within our fast-paced world of cybersecurity. We know it’s the next generation that will build tomorrow’s technology solutions. McAfee interns make substantial contributions and are valued as global team members, joining our...
Security is a Feeling- With the McAfee #SecureMyLife RT2Win Sweepstakes!
Security is a Feeling- Share it with the McAfee #SecureMyLife RT2Win Sweepstakes! The word ‘security’ means something unique to everyone....
How to Remove Trojan Horse Viruses
Basic online scenario—You log onto your computer and notice that something’s just not right, but you can’t quite put your...
How to Wipe Out a Computer Virus
In this article, you’ll learn some of the signs that you may have a computer virus, and you’ll learn tips...
Operation (노스 스타) North Star A Job Offer That’s Too Good to be True?
Executive Summary We are in the midst of an economic slump [1], with more candidates than there are jobs, something...
McAfee Defender’s Blog: Operation North Star Campaign
Building Adaptable Security Architecture Against the Operation North Star Campaign Operation North Star Overview Over the last few months, we...
How to Keep Your Data Safe From the Latest Phishing Scam
As users, we’ll do just about anything to ensure that our devices run as efficiently as possible. This includes renewing...
Six Hundred Million Reasons to Celebrate: No More Ransom Turns FOUR!!
Happy Birthday! Today we mark the fourth anniversary of the NoMoreRansom initiative with over 4.2 million visitors, from 188 countries,...
Women in Sales Part 1: Opportunities for Women Across Cybersecurity Sales
Collaborative, inclusive teams are what redefine cybersecurity solutions for every aspect of our connected world. At McAfee, women are making...
Hunting for Blues – the WSL Plan 9 Protocol BSOD
Windows Subsystem for Linux Plan 9 Protocol Research Overview This is the final blog in the McAfee research series trilogy...
Speed or Security? We Say Speed AND Security
“Security software slows down my PC.” We often hear this sentiment when users talk about malware protection. While people recognize...
What to Do When Your Social Media Account Gets Hacked
You log in to your favorite social media site and notice a string of posts or messages definitely not posted by you....
Staying Home? McAfee Report Shows Malware May Come Knocking
It’s no secret that COVID-19 continues to reshape the way we live our everyday lives. With each passing day, we...
McAfee COVID-19 Report Reveals Pandemic Threat Evolution
The McAfee Advanced Threat Research team today published the McAfee® Labs COVID-19 Threats Report, July 2020. In this “Special Edition”...
Ways to Strengthen Your Family’s Digital and Mental Wellbeing
There’s a lot that feels out of control right now. City and school re-openings are in limbo, and life for...