Featured Blogs
Threat Actors Employ COM Technology in Shellcode to Evade Detection
COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...
Thoughts from the conference floor: securing the connected home
This blog post was written by Nick Viney. In my line of work, you read and hear a lot about...
This Year at Black Hat: Danger Drones and Thermostat Ransomware
This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it...
This World Password Day, Here’s How a Password Manager Can Simplify Your Life
Passwords: we entrust our most important data to these strings of letters, numbers, and special characters. So, we should make...
This Week in Scams: $16.6 Billion Lost, Deepfakes Rise, and Google Email Scams Emerge
Welcome to the first edition of This Week in Scams, a new weekly series from McAfee breaking down the latest...
This Valentine’s Day, Share Your Love, Not Your Personal Data
This blog post was written by Bruce Snell. Valentine’s Day is just around the corner, are you ready? Have you...
This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too
This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too Love is in the...
This Valentine’s Day Let Your Digital Life Take a Backseat
A couple of decades ago, Valentine’s Day was all about red roses, exchanging cards, dinner dates, hand-holding and whispering sweet...
This New “Verification” Trick Fools You Into Installing Malware
Cybercriminals are turning to TikTok to spread new scams that promise “free upgrades” or access to premium versions of popular...
