Featured Blogs
My Top Tips To Help Your Family Stay Safe Online This Holiday Period
‘It’s the most wonderful time of year’ – we’ve all heard the jingles and read the slogans. But the holiday...
My Journey from Intern to Principal Engineer
Written by Shuborno, Principal Engineer At McAfee, architects and engineers continuously have opportunities to make decisions that impact customers and...
My Instagram Has Been Hacked – What Do I Do Now?
In my world of middle-aged mums (mams), Instagram is by far the most popular social media platform. While many of...
My Global Internship Experience
By: Madeleine Human Resources, Intern Picture this: approaching the end of your double degree, applying for internships and work experience...
My Flight Path: From the Royal Air Force to McAfee
By: Gareth, Technical Support Engineer, UK Where do you see yourself in five years? This well-known question is the crux...
My First Six Weeks
I am tasked with writing my first BLOG. With more than 25 years in this industry, I am quickly overwhelmed...
My Favourite Mothering Apps
I honestly don’t know where I would be without my favourite collection of apps. With four kids, too many pets,...
My Experience as a Finance Intern at McAfee for Summer 2020
By: Nilisha, Finance Intern, Plano, TX, United States Amidst this global pandemic, I was fortunate enough to have the opportunity...
My email has been hacked! What should I do next?
If you find that your email has been hacked, your immediate reaction is probably wondering what you should next. The answer: take a deep...
My Child Wants a Phone. Should I Say ‘Yes’?
There are several factors to consider before taking this significant decision. Apart from their age, their maturity level, technology habits, and your gut instinct should be the primary considerations.
My Best Online Tips To Get You Sorted For Christmas
Every year I promise myself I am going to be super organised for Christmas. Invariably, I fail. But this year,...
My Adventures Hacking the iParcelBox
In 2019, McAfee Advanced Threat Research (ATR) disclosed a vulnerability in a product called BoxLock. Sometime after this, the CEO...
MWC Preview: Tailoring Security to the Modern Connected Lifestyle
In 2018, we’re officially living in the “future” imagined by popular 80s movies. No, we still don’t have flying cars,...
MWC 2019: Why 5G + Fortnite = a win-win for criminals
So apparently, the company behind Fortnite has so much cash that it’s forming a $100 million prize fund for upcoming...
MWC 2019: The Key to Establishing Digital Trust with Intelligent Connectivity
These days, it’s rare to walk into a home that doesn’t have a smart device in use. From voice assistants,...
MWC 2018: Takeaways on the Key Devices and Innovations
It’s hard to believe that MWC 2018 is already over! Though the event came and went in the blink of...
MWC 2017: What We Learned About the Mobile Landscape
MWC (Mobile World Congress) has come and gone yet again, and over the course of the four-day conference we’ve seen...
Multiple Java Exploits Hide in a Jar (File)
Exploits of the Java Runtime Environment (JRE) have been extensively used in drive-by-download toolkits such as Blackhole and Red Kit....
Multiplatform Fake AV Uses Different GUIs
Since the beginning of October we have seen a variant of fake antivirus malware that belongs to the FakeRean family...
Multi-tricks HiddenAds Malware
Thousands of HiddenAds Trojan Apps Masquerade as Google Play Apps The McAfee mobile research team has recently discovered a new...
Mr. Robot Gets Hacking Right. Here’s How
If you have an interest in cybersecurity and popular culture, do yourself a favor now: go watch Mr. Robot, USA...
Mr. Coffee with WeMo: Double Roast
McAfee Advanced Threat Research recently released a blog detailing a vulnerability in the Mr. Coffee Coffee Maker with WeMo. Please...
MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters
Every year, more and more words are making it into the English dictionary. The next one to make its debut...
Most Unwanted Criminals: Phishers, Shoulder Surfers and Keyloggers
McAfee’s most unwanted criminals have included pickpockets, Trojan viruses, and ATM skimmers, dumpster divers, spies, and wireless hackers and now...
Most Dangerous Celebrity 2020 Sweepstakes
McAfee “Most Famous to Most Dangerous to Search for Online” 2020 MDC Sweepstakes Terms and Conditions NO PURCHASE OR PAYMENT...
Most Dangerous Celebrities 2017: #RT2Win a Hollywood Worthy Prize
“Hey hey, you you!” Did you hear that we released our 2017 Most Dangerous Celebrities List? This year marks the...
Most Dangerous Celebrities 2016: #RT2Win a Red Carpet-Worthy Prize
Everybody loves some celebrity gossip once in a while. Whether you sift through tabloids in the checkout aisle, or bookmark...