Featured Blogs
Introduction and Application of Model Hacking
Catherine Huang, Ph.D., and Shivangee Trivedi contributed to this blog. The term “Adversarial Machine Learning” (AML) is a mouthful! The...
Consumers want a fully connected life – but at what cost?
Convenience has always, and will always be king. That’s why it’s no surprise that the average person is collecting connected...
Timeless Principles to Help Your Child Develop Social Superpowers
“You can make more friends in two months by becoming interested in other people than you can in two years...
How You (and Your Teen) Can Stay Safe While Looking for Love Online
Valentine’s Day is such a double-edged sword. If you’re feeling the love and just can’t get enough of your sweetheart...
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I
For many years now I have been working and teaching in the field of digital forensics, malware analysis and threat...
Knock, Knock – Who’s There?
A Windows Linux Subsystem Interop Analysis Following our research from Evil Twins and Windows Linux Subsystem, interoperability between different WSL...
How Chinese Cybercriminals Use Business Playbook to Revamp Underground
Preface Because of its longevity and technical sophistication, the Russian cybercriminal underground has long been the benchmark for threat researchers...
Intelligence in the Enterprise
Intelligence became an integral military discipline centuries ago. More recently, this practice evolved into what is called Intelligence Preparation of the Battlefield,...
Safer Internet Day 2020
What Can You Do To Make The Internet a Better Place In 2020, you’d be hard-pressed to find an Aussie...
WhatsApp Users: Secure Your Desktop With These Tips
With over 500 million daily active users, WhatsApp is one of the world’s most popular messaging platforms. In an effort...
7 Conversations to Help Build Up Your Family’s Digital Literacy Skills
With the surge of misleading content online, helping your child learn to become an independent thinker is no small task....
McAfee’s Women in Security Offer New Grads Career Insights
Launching your career is an exciting milestone, one that can also be nerve-wracking though. Chances are questions like What should...
How To Protect Your Vote During Election
The 2020 U.S. presidential primaries are right around the corner. As people gear up to cast their ballots for party...
U.S. Battleground County Website Security Survey
Today McAfee released the results of a survey of county websites and county election administration websites in the 13 states...
Spotting Fake News: Teaching Kids to be Responsible Online Publishers
Editor’s note: This is part II in a series on Fake News. Read part I, here. Kids today are not...
Security Lessons From 2019’s Biggest Data Breaches
2019 already feels like it’s worlds away, but the data breaches many consumers faced last year are likely to have...
What You Need to Know About the FedEx SMiShing Scam
You receive a text message saying that you have a package out for delivery. While you might feel exhilarated at...
Take Action This Data Privacy Day
We all know that data breaches have been on the rise, and hackers are finding clever, new ways to access...
Where’s the Truth Online? How to Build Your Family’s Digital Discernment
Note: This is Part I of a series on equipping your family fight back against fake news online. Fake news...
An Inside Look into Microsoft Rich Text Format and OLE Exploits
There has been a dramatic shift in the platforms targeted by attackers over the past few years. Up until 2016,...
You Bring the Yoga Mat, McAfee Brings the Goats
Yogis are likely familiar with the term vinyasa, but have you heard of caprine vinyasa? Caprine vinyasa elevates your standard...
Dangerous Digital Rituals: Could Your Child be Sleep Deprived?
You’re not wrong if you suspect your kids are spending far more time online than they admit. Where you may...
CurveBall – An Unimaginative Pun but a Devastating Bug
Enterprise customers looking for information on defending against Curveball can find information here. 2020 came in with a bang this...
What CVE-2020-0601 Teaches Us About Microsoft’s TLS Certificate Verification Process
By: Jan Schnellbächer and Martin Stecher, McAfee Germany GmbH This week security researches around the world were very busy working...
What Is the CurveBall Bug? Here’s What You Need to Know
Today, it was announced that researchers published proof of concept code (essentially, an exercise to determine if an idea is a reality) that exploits a recently patched vulnerability in...
The Top Technology Takeaways From CES 2020
Another Consumer Electronics Show (CES) has come and gone. Every year, this trade show joins practically everyone in the consumer...
Less is More: 5 Ways to Jumpstart a ‘Digital Minimalist’ Mindset
Editor’s Note: This is part II of a series on Digital Minimalism in 2020. Is this the year you rethink...