Featured Blogs
Introducing McAfee’s Scam Detector – Now Included in All Core Plans
In today’s online world, scams are everywhere—and they’re harder to spot than ever. From sophisticated phishing texts and deepfake videos...
Introducing Personal Data Cleanup
We’re excited to announce the release of McAfee’s Personal Data Cleanup, a new feature that finds and removes your personal info from data brokers and people search sites. Now, you can feel more confident by removing personal info from data broker sites and keeping it from being collected, sold, and used.
Introducing Personal Data Cleanup
We’re excited to announce the release of McAfee’s Personal Data Cleanup, a new feature that finds and removes your personal info from data brokers and people search sites. Now, you can feel more confident by removing personal info from data broker sites and keeping it from being collected, sold, and used.
Introducing Scam Stories: A McAfee Campaign to End Scam Stigma
When Grey’s Anatomy actor Chris Carmack and musician Erin Slaver tried to order custom patio cushions from what seemed like...
Introducing Social Privacy Manager
If you’re concerned about your privacy on social media, you have plenty of company. Here’s something else you have —...
Introducing the McAfee Partner Program
What better way to kickoff the start of 2015 than with our new McAfee Partner Program. This new program was...
Introducing the ‘Most Hackable’ Gifts of the Holiday Season
It’s that time of year again: the time for a gauntlet of ads, shopping trips, and crowds as we begin...
Introducing World’s First Automatic and AI-powered Deepfake Detector
In today’s digital age, the line between reality and digital fabrication is increasingly blurred, thanks to the rise of deepfake...
Introduction and Application of Model Hacking
Catherine Huang, Ph.D., and Shivangee Trivedi contributed to this blog. The term “Adversarial Machine Learning” (AML) is a mouthful! The...
Introduction to “Is Your Digital Front Door Unlocked?” a book by Gary Davis
“Is Your Digital Front Door Unlocked?” explores the modern implications of our human nature: our inherent inclination to share our...
Invisible Adware: Unveiling Ad Fraud Targeting Android Users
Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and it’s no surprise...
iOS Users Aren’t So Immune to Threats After All
10 years ago, Fergie and Gwen Stefani were at the top of the charts, and Juno had just been...
iOS Users: Update Your Software to Avoid Security Vulnerabilities
On Monday, Apple made some bold announcements at their keynote event, including new subscription offerings for news, television, video games,...
IoT and Privacy: Keeping Secrets from your Webcam
This blog post was written by Bruce Snell. Have you ever put your kids to bed only to have them...
IoT Devices: The Gift that Keeps on Giving… to Hackers
McAfee Advanced Threat Research on Most Hackable Gifts You’ve probably noticed the recent increase in Internet connected drones, digital assistants,...
IoT Lockdown: Ways to Secure Your Family’s Digital Home and Lifestyle
If you took an inventory of your digital possessions chances are, most of your life — everything from phones to...
IoT Zero-Days – Is Belkin WeMo Smart Plug the Next Malware Target?
Effective malware is typically developed with intention, targeting specific victims using either known or unknown vulnerabilities to achieve its primary...
iPhone Update — Apply It Now If You Haven’t Already
Apple recently issued an urgent iPhone update, iOS version 16.5.1. If you haven’t updated yet, you should. Owners of iPads...
iPhone Users: Here’s What You Need to Know About the Latest iOS Hacks
iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently...
iPhone Users: This Mobile Malware Could Allow Cybercriminals to Track Your Location
The iPhone and many of the apps designed to live on the device have the ability to track our location....
IPS Countermeasures Fight Obfuscation, Evasion
Before the advent of intrusion detection systems (IDS) and intrusion prevention systems (IPS), firewalls served as the primary technology to...
Iran Cyber Threat Update
Recent political tensions in the Middle East region have led to significant speculation of increased cyber-related activities. McAfee is on...
Iranian Keylogger Marmoolak Enters via Backdoor
Targeted attacks have several stages, sometimes called the APT kill chain. At McAfee Labs we prefer the model described by...
Iron Man’s Instagram Hacked: Snap Away Cybercriminals With These Social Media Tips
Celebrities: they’re just like us! Well, at least in the sense that they still face common cyberthreats. This week, “Avengers:...
Is a Laptop’s Password Enough to Keep it Secure?
It could happen to any of us. One minute your laptop is sitting on a coffeehouse table or going through...
Is Disckreet App Really That Discreet?
Love is a powerful feeling that can cause an individual to do things they wouldn’t normally do—sometimes in a way...
Is Dropbox Dropping in on Your Shared Files?
The ability to instantly share and interact through online sources has become an expected part of our daily lives. We...
