Featured Blogs
An Inside Look into Microsoft Rich Text Format and OLE Exploits
There has been a dramatic shift in the platforms targeted by attackers over the past few years. Up until 2016,...
You Bring the Yoga Mat, McAfee Brings the Goats
Yogis are likely familiar with the term vinyasa, but have you heard of caprine vinyasa? Caprine vinyasa elevates your standard...
Dangerous Digital Rituals: Could Your Child be Sleep Deprived?
You’re not wrong if you suspect your kids are spending far more time online than they admit. Where you may...
CurveBall – An Unimaginative Pun but a Devastating Bug
Enterprise customers looking for information on defending against Curveball can find information here. 2020 came in with a bang this...
What CVE-2020-0601 Teaches Us About Microsoft’s TLS Certificate Verification Process
By: Jan Schnellbächer and Martin Stecher, McAfee Germany GmbH This week security researches around the world were very busy working...
What Is the CurveBall Bug? Here’s What You Need to Know
Today, it was announced that researchers published proof of concept code (essentially, an exercise to determine if an idea is a reality) that exploits a recently patched vulnerability in...
The Top Technology Takeaways From CES 2020
Another Consumer Electronics Show (CES) has come and gone. Every year, this trade show joins practically everyone in the consumer...
Less is More: 5 Ways to Jumpstart a ‘Digital Minimalist’ Mindset
Editor’s Note: This is part II of a series on Digital Minimalism in 2020. Is this the year you rethink...
Research Reveals Americans’ Perceptions of Device Security Amidst CES 2020
From the Lifx Switch smart switch to the Charmin RollBot to Kohler Setra Alexa-connected faucets, CES 2020 has introduced new...
Iran Cyber Threat Update
Recent political tensions in the Middle East region have led to significant speculation of increased cyber-related activities. McAfee is on...
Viva Las Vegas: Cash Out with the #McAfeeAtCES RT2Win Sweepstakes!
We’ve officially touched down in Las Vegas for CES 2020! If you aren’t familiar with CES, it is the global...
What You Need to Know About the Latest IoT Device Flaws
The McAfee Advanced Threat Research (ATR) team recently uncovered a security flaw in a popular connected garage door opener and...
We Be Jammin’ – Bypassing Chamberlain myQ Garage Doors
The convenience that many IOT devices provide often persuades consumers away from thinking about possible security concerns. McAfee Advanced Threat Research recently investigated Chamberlain’s MyQ Hub, a “Universal” garage door automation platform.
The Cloning of The Ring – Who Can Unlock Your Door?
Steve Povolny contributed to this report. McAfee’s Advanced Threat Research team performs security analysis of products and technologies across nearly...
The Tradeoff Between Convenience and Security – A Balance for Consumers & Manufacturers
This week McAfee Advanced Threat Research (ATR) published new findings, uncovering security flaws in two popular IoT devices: a connected...
Do You Have Blind Spots? McAfee Welcomes Check Your Blind Spots Bus Tour
A bus, virtual reality, and conversations around inclusion. How do all these fit together? The answer: CEO Action’s Check Your...
Is It Time to Overhaul Your Relationship with Technology?
Editor’s Note: This is part I of a series on Digital Minimalism in 2020. When Steve Jobs introduced the iPhone...
Lessons Learned: A Decade of Digital Parenting
Give yourself a high-five, parents. Pour yourself a cup of coffee or your favorite celebratory drink and sip it slow...
10 Thoughtful (Free) Holiday Gifts to Give Your Friends Year ‘Round
Just a quick poll. What feelings do these digital scenarios evoke: being ghosted, getting trapped in a group text, being...
Don’t RSVP to This Holiday Party: Protect Yourself From the Emotet Trojan
The holiday season is officially among us. From last-minute holiday shopping to attending countless parties, this time of year keeps...
Here’s How the California Consumer Privacy Act Will Affect You
On May 25, 2018, the European Union implemented a new privacy legislature called the General Data Protection Regulation or GDPR....
Cybercriminal Speaks With Child via Hacked Smart Camera: How You Can Stay Protected
IoT devices enter our homes out of ease and convenience, as the gadgets often optimize or streamline ordinary tasks —...
Parents: You May Want to Pay Closer Attention to the TikTok App
You aren’t imagining things. Everyone is talking about the popular video-sharing app TikTok. That’s because it has simultaneously become both...
750K Birth Certificate Applications Exposed Online: 5 Tips to Help You Stay Secure
Most people applying for birth certificates aren’t thinking that their private information will be made readily available to the public....
Top Tips to Spot Tech Support Scams
There are number of ways scammers use to target your money or personal details. These scams include support sites for...
7 Tips to Make Sure Your Smartphone Use Doesn’t Ruin Holiday Gatherings
The gravy wasn’t the only thing steaming at the Thanksgiving table this year. Grandma wasn’t happy. It turns out that...
Attention Android Users: Is CallerSpy Malware Spying on You?
Meet CallerSpy malware, a new form of mobile malware designed to snoop on calls, texts, and other smartphone communications. This...