Featured Blogs
Can All-in-One Printers Be Hacked? “Hackable?” Sets the Fax Straight
The heyday of fax technology may have been in the 80s, but all-in-one printers found throughout homes and offices often...
In NTDLL I Trust – Process Reimaging and Endpoint Security Solution Bypass
Process Reimaging Overview The Windows Operating System has inconsistencies in how it determines process image FILE_OBJECT locations, which impacts non-EDR...
Why Process Reimaging Matters
As this blog goes live, Eoin Carroll will be stepping off the stage at Hack in Paris having detailed the...
3 Tips Venmo Users Should Follow to Keep Their Transactions Secure
You’ve probably heard of Venmo, the quick and convenient peer-to-peer mobile payments app. From splitting the check when eating out...
Process Reimaging: A Cybercrook’s New Disguise for Malware
As of early 2019, Windows 10 is running on more than 700 million devices, including PCs, tablets, phones, and even...
Kids Obsessed with YouTube? How to Help Them Stay Balanced, Safe This Summer
If you haven’t seen your kids in a few hours but can hear outbursts of laughter from a nearby room,...
RDP Security Explained
RDP on the Radar Recently, McAfee released a blog related to the wormable RDP vulnerability referred to as CVE-2019-0708 or...
Catch a Ride Via Wearable
More often than not, commuters and travelers alike want to get to their destination quickly and easily. The advent of...
How McAfee’s Paternity Leave Helped My New Family
By: Guillaume, EMEA Retail Marketing Manager, Slough, U.K. Becoming a parent is a daunting experience for anyone. The sheer amount...
#Verified or Phishing Victim? 3 Tips to Protect Your Instagram Account
If you’re an avid Instagram user, chances are you’ve come across some accounts with a little blue checkmark next to...
Can Video Game “Mods” Expose Players to Malware?
“Hackable?” host Geoff Siskind’s son is a huge fan of the world-building computer game Minecraft — and downloads “mods” for...
Is Your Smart Home Secure? 5 Tips to Help You Connect Confidently
With so many smart home devices being used today, it’s no surprise that users would want a tool to help...
Summer Scam Alerts: Don’t Let Crooks Wreck Your Family Travel Plans
While our click-and-pay digital lifestyle makes accessing travel and entertainment more convenient, for every app or website we loop into...
Evolved IoT Linux Worm Targets Users’ Devices
Since the early ‘90s, Linux has been a cornerstone of computer operating systems. Today, Linux is everywhere — from smartphones...
How to Help Kids Build Strong Digital Habits Before Summer Slips Away
Few seasons are more important to the parent-child bond than summer. The days are longer, fewer activities are crowding the...
Watch Your Webcam: Tips to Protect Your Mac From Zoom Hackers
You’ve probably heard of the popular video conferencing platform, Zoom. This platform enables its millions of users in various locations...
Sharing Isn’t Always Caring: 3 Tips to Help Protect Your Online Privacy
It’s 2019 and technology is becoming more sophisticated and prevalent than ever. With more technology comes greater connectivity. In fact,...
Is Your WhatsApp Being Weird? You May Need to Check For Hidden Malware
With over 2.5 billion monthly active users that have accumulated since its fruition, Android has seen massive growth over the...
Family Safety: Twitter, Instagram Beef Up Measures to Fight Hate Speech, Bullying
The past few weeks have proven to be wins for family safety with several top social networks announcing changes to...
Could a Dropped USB Drive Expose You to Malware?
USB drives seem harmless enough and they’re a convenient way to store, back up, or transfer files from your computer....
McAfee ATR Aids Police in Arrest of Rubella & Dryad Office Macro Builder
Everyday thousands of people receive emails with malicious attachments in their email inbox. Disguised as a missed payment or an...
Downloaded FaceApp? Here’s How Your Privacy Is Now Affected
If you’ve been on social media recently, you’ve probably seen some people in your feed posting images of themselves looking...
Demystifying Blockchain: Sifting Through Benefits, Examples and Choices
You have likely heard that blockchain will disrupt everything from banking to retail to identity management and more. You may...
School of Cyberthreats: 3 Attacks Impacting Today’s Schools
Educational institutions are data-rich gold mines. From student and employee records to sensitive financial information, schools contain a plethora of...
McAfee for McAfee: An Intern Journey
By Gwendolyn McAfee My grandfather always told me that I could achieve anything the world has to offer if I...
4 Ways for Parents to Handle the Facebook Messenger Bug
9 out of 10 children in the U.S. between the ages of six and twelve have access to smart devices....
No More Ransom Blows Out Three Birthday Candles Today
Collaborative Initiative Celebrates Helping More Than 200,000 Victims and Preventing More Than 100 million USD From Falling into Criminal Hands...