Featured Blogs
Examining the Link Between TLD Prices and Abuse
This blog was written by Charlie Feng. Briefing Over the years, McAfee researchers have observed that certain new top-level Domains...
FOMO: How to Help Digital Kids Overcome the Feeling of Missing Out
What happens when you give hundreds of teenagers smartphones and unlimited access to chat apps and social networks 24/7? A...
Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423
In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft’s Jet Database Engine....
Capital One Data Breach: How Impacted Users Can Stay More Secure
Capital One is one of the 10 largest banks based on U.S. deposits. As with many big-name brands, cybercriminals see...
The Twin Journey, Part 1
Summary and Introduction: The recent changes in Windows 10, aiming to add case sensitivity (CS) at directory level, have prompted...
Clop Ransomware
This new ransomware was discovered by Michael Gillespie on 8 February 2019 and it is still improving over time. This...
DHCP Client Remote Code Execution Vulnerability Demystified
CVE-2019-0547 CVE-2019-0547 was the first vulnerability patched by Microsoft this year. The dynamic link library, dhcpcore.dll, which is responsible for...
5 Digital Risks That Could Affect Your Kids This New School Year
Starting a new school year is both exciting and stressful for families today. Technology has magnified learning and connection opportunities...
The McAfee Americas Channel Promise
In my 26th year at McAfee, my fourth leading the Americas Channel Organization, I wanted to take a step back...
The Twin Journey, Part 2: Evil Twins in a Case In-sensitive Land
In the first of this 3-part blog series, we covered the implications of promoting files to “Evil Twins” where they...
MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play
The McAfee mobile research team has found a new type of Android malware for the MoqHao phishing campaign (a.k.a. XLoader...
23M CafePress Accounts Compromised: Here’s How You Can Stay Secure
You’ve probably heard of CafePress, a custom T-shirt and merchandise company allowing users to create their own unique apparel and...
Avaya Deskphone: Decade-Old Vulnerability Found in Phone’s Firmware
Avaya is the second largest VOIP solution provider (source) with an install base covering 90% of the Fortune 100 companies...
From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta
Management. Control. It seems that you can’t stick five people in a room together without one of them trying to...
How to Help Kids Steer Clear of Digital Drama this School Year
Editor’s note: This is Part II of helping kids manage digital risks this new school year. Read Part I. The...
Dorms, Degrees, and Data Security: Prepare Your Devices for Back to School Season
With summer coming to a close, it’s almost time for back to school! Back to school season is an exciting...
The Twin Journey, Part 3: I’m Not a Twin, Can’t You See my Whitespace at the End?
In this series of 3 blogs (you can find part 1 here, and part 2 here), so far we have...
Backpacks Ready, Pencils Up – It’s Time for a Back-to-School #RT2Win
It’s time to unpack the suitcases and pack up those backpacks! With the summer season quickly coming to an end,...
How To Help Your Kids Manage Our ‘Culture of Likes’
As a mum of 4 sons, my biggest concerns about the era of social media is the impact of the...
How to Build Your 5G Preparedness Toolkit
5G has been nearly a decade in the making but has really dominated the mobile conversation in the last year...
The Cerberus Banking Trojan: 3 Tips to Secure Your Financial Data
A new banking trojan has emerged and is going after users’ Android devices. Dubbed Cerberus, this remote access trojan allows...
Digital Parenting: How to Keep the Peace with Your Kids Online
Simply by downloading the right combination of apps, parents can now track their child’s location 24/7, monitor their same social...
Boost Your Bluetooth Security: 3 Tips to Prevent KNOB Attacks
Many of us use Bluetooth technology for its convenience and sharing capabilities. Whether you’re using wireless headphones or quickly Airdropping...
Lights, Camera, Cybersecurity: What You Need to Know About the MoviePass Breach
If you’re a frequent moviegoer, there’s a chance you may have used or are still using movie ticket subscription service...
Clicks & Cliques: How to Help Your Daughter Deal with Mean Girls Online
According to a new report released by the National Center for Education Statistics (NCES), mean girls are out in force online....
Ellen DeGeneres Instagram Hack: What You Can Do to Protect Your Account
Today was not an easy morning for Ellen DeGeneres. She woke to find that her Instagram account was briefly hacked...
Beware of Back-To-School Scams
These days it seems that there is a scam for every season, and back-to-school is no different. From phony financial...