Featured Blogs
International Women’s Day in the Channel
I have had the privilege of working with many exceptional people over the course of my career. For International Women’s...
Internet Browser Cookies: Not What Grandma Used To Make
Imagine you’re surfing the web in search of a new pair of shoes on Zappos.com. You browse the website, look...
Internet Explorer Zero Day Offers Unusual Case Study
While analyzing a recent Internet Explorer zero-day vulnerability, CVE-2014-0322 (containing the Flash sample hash b9c9dab0fd30418884800afebbaba4d99f4526ef0c9a47972a20ab20fed0a06d), we noticed the exploit makes...
Internet Privacy: Tips & Tricks for Staying Secure Online
How much value do you place on your personal privacy? You would never leave your wallet on a public park...
Internet Safety Begins with All of Us
A safer internet isn’t a nice thing to have. It’s a necessity because we rely on it so heavily. And there’s...
Internet Safety for Kids: A Refresher for Homebound Families
Editor’s Note: This is part II of our internet safety for kids series. Part I focuses on younger children and...
Internet Safety Resolutions for 2013
My daughter loves forming New Year resolutions! Every January 01, she diligently pens down her resolutions (always interesting ones!) on...
Interviewing for a Job? Spot a Scam with These Questions
Job scams are on the rise. And asking the right questions can help steer you clear of them. That rise...
Introducing AI PCs with McAfee Deepfake Detector
In today’s digital world, both personal and professional environments are evolving faster than ever. As artificial intelligence (AI) becomes integral...
Introducing App Reputation for Android Apps
McAfee has always been in the forefront of finding new ways to secure our customers against threats and risks posed...
Introducing McAfee’s Scam Detector – Now Included in All Core Plans
In today’s online world, scams are everywhere—and they’re harder to spot than ever. From sophisticated phishing texts and deepfake videos...
Introducing Personal Data Cleanup
We’re excited to announce the release of McAfee’s Personal Data Cleanup, a new feature that finds and removes your personal info from data brokers and people search sites. Now, you can feel more confident by removing personal info from data broker sites and keeping it from being collected, sold, and used.
Introducing Personal Data Cleanup
We’re excited to announce the release of McAfee’s Personal Data Cleanup, a new feature that finds and removes your personal info from data brokers and people search sites. Now, you can feel more confident by removing personal info from data broker sites and keeping it from being collected, sold, and used.
Introducing Scam Stories: A McAfee Campaign to End Scam Stigma
When Grey’s Anatomy actor Chris Carmack and musician Erin Slaver tried to order custom patio cushions from what seemed like...
Introducing Social Privacy Manager
If you’re concerned about your privacy on social media, you have plenty of company. Here’s something else you have —...
Introducing the McAfee Partner Program
What better way to kickoff the start of 2015 than with our new McAfee Partner Program. This new program was...
Introducing the ‘Most Hackable’ Gifts of the Holiday Season
It’s that time of year again: the time for a gauntlet of ads, shopping trips, and crowds as we begin...
Introducing World’s First Automatic and AI-powered Deepfake Detector
In today’s digital age, the line between reality and digital fabrication is increasingly blurred, thanks to the rise of deepfake...
Introduction and Application of Model Hacking
Catherine Huang, Ph.D., and Shivangee Trivedi contributed to this blog. The term “Adversarial Machine Learning” (AML) is a mouthful! The...
Introduction to “Is Your Digital Front Door Unlocked?” a book by Gary Davis
“Is Your Digital Front Door Unlocked?” explores the modern implications of our human nature: our inherent inclination to share our...
Invisible Adware: Unveiling Ad Fraud Targeting Android Users
Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and it’s no surprise...
iOS Users Aren’t So Immune to Threats After All
10 years ago, Fergie and Gwen Stefani were at the top of the charts, and Juno had just been...
iOS Users: Update Your Software to Avoid Security Vulnerabilities
On Monday, Apple made some bold announcements at their keynote event, including new subscription offerings for news, television, video games,...
IoT and Privacy: Keeping Secrets from your Webcam
This blog post was written by Bruce Snell. Have you ever put your kids to bed only to have them...
IoT Devices: The Gift that Keeps on Giving… to Hackers
McAfee Advanced Threat Research on Most Hackable Gifts You’ve probably noticed the recent increase in Internet connected drones, digital assistants,...
IoT Lockdown: Ways to Secure Your Family’s Digital Home and Lifestyle
If you took an inventory of your digital possessions chances are, most of your life — everything from phones to...
IoT Zero-Days – Is Belkin WeMo Smart Plug the Next Malware Target?
Effective malware is typically developed with intention, targeting specific victims using either known or unknown vulnerabilities to achieve its primary...