Featured Blogs
4 Ways for Parents to Handle the Facebook Messenger Bug
9 out of 10 children in the U.S. between the ages of six and twelve have access to smart devices....
No More Ransom Blows Out Three Birthday Candles Today
Collaborative Initiative Celebrates Helping More Than 200,000 Victims and Preventing More Than 100 million USD From Falling into Criminal Hands...
Examining the Link Between TLD Prices and Abuse
This blog was written by Charlie Feng. Briefing Over the years, McAfee researchers have observed that certain new top-level Domains...
FOMO: How to Help Digital Kids Overcome the Feeling of Missing Out
What happens when you give hundreds of teenagers smartphones and unlimited access to chat apps and social networks 24/7? A...
What Is Mshta, How Can It Be Used and How to Protect Against It
The not-so Usual Suspects There is a growing trend for attackers to more heavily utilize tools that already exist on...
Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423
In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft’s Jet Database Engine....
Capital One Data Breach: How Impacted Users Can Stay More Secure
Capital One is one of the 10 largest banks based on U.S. deposits. As with many big-name brands, cybercriminals see...
The Twin Journey, Part 1
Summary and Introduction: The recent changes in Windows 10, aiming to add case sensitivity (CS) at directory level, have prompted...
Be Wary of WhatsApp Messages Offering 1000GB of Free Data
Global messaging giant WhatsApp turned 10 years old this year. It’s not unusual for companies to provide loyal customers or...
Clop Ransomware
This new ransomware was discovered by Michael Gillespie on 8 February 2019 and it is still improving over time. This...
DHCP Client Remote Code Execution Vulnerability Demystified
CVE-2019-0547 CVE-2019-0547 was the first vulnerability patched by Microsoft this year. The dynamic link library, dhcpcore.dll, which is responsible for...
5 Digital Risks That Could Affect Your Kids This New School Year
Starting a new school year is both exciting and stressful for families today. Technology has magnified learning and connection opportunities...
The McAfee Americas Channel Promise
In my 26th year at McAfee, my fourth leading the Americas Channel Organization, I wanted to take a step back...
The Twin Journey, Part 2: Evil Twins in a Case In-sensitive Land
In the first of this 3-part blog series, we covered the implications of promoting files to “Evil Twins” where they...
MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play
The McAfee mobile research team has found a new type of Android malware for the MoqHao phishing campaign (a.k.a. XLoader...
23M CafePress Accounts Compromised: Here’s How You Can Stay Secure
You’ve probably heard of CafePress, a custom T-shirt and merchandise company allowing users to create their own unique apparel and...
Avaya Deskphone: Decade-Old Vulnerability Found in Phone’s Firmware
Avaya is the second largest VOIP solution provider (source) with an install base covering 90% of the Fortune 100 companies...
HVACking: Understanding the Delta Between Security and Reality
The McAfee Labs Advanced Threat Research team is committed to uncovering security issues in both software and hardware to help...
From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta
Management. Control. It seems that you can’t stick five people in a room together without one of them trying to...
How to Help Kids Steer Clear of Digital Drama this School Year
Editor’s note: This is Part II of helping kids manage digital risks this new school year. Read Part I. The...
McAfee AMSI Integration Protects Against Malicious Scripts
This blog describes how the AMSI (Antimalware Scan Interface) is used within the various McAfee products, and highlights some of the malware we are able to detect with it.
Dorms, Degrees, and Data Security: Prepare Your Devices for Back to School Season
With summer coming to a close, it’s almost time for back to school! Back to school season is an exciting...
The Twin Journey, Part 3: I’m Not a Twin, Can’t You See my Whitespace at the End?
In this series of 3 blogs (you can find part 1 here, and part 2 here), so far we have...
Backpacks Ready, Pencils Up – It’s Time for a Back-to-School #RT2Win
It’s time to unpack the suitcases and pack up those backpacks! With the summer season quickly coming to an end,...
How To Help Your Kids Manage Our ‘Culture of Likes’
As a mum of 4 sons, my biggest concerns about the era of social media is the impact of the...
How to Build Your 5G Preparedness Toolkit
5G has been nearly a decade in the making but has really dominated the mobile conversation in the last year...
The Cerberus Banking Trojan: 3 Tips to Secure Your Financial Data
A new banking trojan has emerged and is going after users’ Android devices. Dubbed Cerberus, this remote access trojan allows...