Featured Blogs
How to Protect Your Smart Cameras and Wi-Fi Baby Monitors
People who use devices like smart cameras and Wi-Fi-enabled baby monitors should strongly consider taking the following steps to protect...
Women in Sales Part 5: The Value of Support Networks and Inspiration
Women at McAfee are making powerful contributions to our sales efforts. Saleswomen from varying backgrounds share their unique perspectives in hopes of encouraging more women...
What Security Means to Professionals
What Security Means to Professionals Recently, we conducted a survey of 600 families and professionals in the U.S. to better...
ScamsWeek2020
Here’s How to Be Yourself and NOT let a Scammer Be You! If you hadn’t truly embraced the incredible benefits...
Back-to-School: Could Your Remote Learner Be Cyber Cheating?
Back-to-School: Could Your Remote Learner Be Cyber Cheating? As families across the country ramp up for the new school year,...
Back-to-School: Prepping Your Tech for Learning Pods or Micro School
Back-to-School: Prepping Your Tech for Learning Pods or Micro School With a new academic year starting up, the look of...
On Drovorub: Linux Kernel Security Best Practices
Intro In a U.S. government cyber security advisory released today, the National Security Agency and Federal Bureau of Investigation warn...
How to Date Safely Online
If you are a young person looking for your ‘special someone’ then 2020 would have seriously cramped your style. Whether...
How To Secure Your Car’s Computer
Just like any other technological device, car computer systems aren't immune to cyber threats. Cybersecurity attacks on cars can pose serious safety threats and privacy issues.
Vulnerability Discovery in Open Source Libraries Part 1: Tools of the Trade
Executive Summary Open source has become the foundation for modern software development. Vendors use open source software to stay competitive...
What Security Means to Elders
What Security Means to Elders Recently, we conducted a survey of 600 families and professionals in the U.S. to better...
Cyberbullying’s Impact on Both Society and Security
More than half of children say that a cyberbully targeted them online. That disquieting stat comes from our recent global...
Women in Sales Part 3: Traits for Success in Cybersecurity Sales
At McAfee, women are finding the inclusiveness and tools to succeed in cybersecurity sales, a field often misconceived because of its technical background. They are doing...
Robot Character Analysis Reveals Trust Issues
Retired Marine fighter pilot and Top Gun instructor Dave Berke said “Every single thing you do in your life, every...
Call an Exorcist! My Robot’s Possessed!
Overview As part of our continued goal of helping developers provide safer products for businesses and consumers, we here at...
Dopple-ganging up on Facial Recognition Systems
Co-authored with Jesse Chick, OSU Senior and Former McAfee Intern, Primary Researcher. Special thanks to Dr. Catherine Huang, McAfee Advanced...
Ripple20 Critical Vulnerabilities – Detection Logic and Signatures
This document has been prepared by McAfee Advanced Threat Research in collaboration with JSOF who discovered and responsibly disclosed the...
My Experience as a Finance Intern at McAfee for Summer 2020
By: Nilisha, Finance Intern, Plano, TX, United States Amidst this global pandemic, I was fortunate enough to have the opportunity...
