Featured Blogs
Model Hacking ADAS to Pave Safer Roads for Autonomous Vehicles
The last several years have been fascinating for those of us who have been eagerly observing the steady move towards...
Moore’s Law and Security
In case you haven’t noticed, you owe Moore’s Law a belated birthday card. The famed theorem, which set the technology...
MoqHao evolution: New variants start automatically right after installation
Authored by Dexter Shin MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first...
MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play
The McAfee mobile research team has found a new type of Android malware for the MoqHao phishing campaign (a.k.a. XLoader...
More Apps for Younger Users Emerging. Here’s What Parents Need to Know.
More and more social platforms are coming up with safer ways for younger kids to access their apps. The most...
More Capable IoT Botnets to Emerge as the ‘Pros’ Enter the Fray
On the heels of severe distributed denial of service (DDoS) attacks, we see new botnets emerging that are powered by...
More Dangers of Cyberbullying Emerge—Our Latest Connected Family Report
Earlier this year, our global Connected Family Study revealed the online habits of parents and their children. What we found...
More Details on "Operation Aurora"
Earlier today, George Kurtz posted an entry, ‘Operation “Aurora” Hit Google, Others’,  on the McAfee’s Security Insight blog The purpose...
More Japanese Chat Apps on Google Play Steal Phone Numbers
In two recent blogs, McAfee Labs described Japanese and Korean Android apps on Google Play that steal a mobile device’s...
More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked
In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else. Everyone else is...
Most Dangerous Celebrities 2016: #RT2Win a Red Carpet-Worthy Prize
Everybody loves some celebrity gossip once in a while. Whether you sift through tabloids in the checkout aisle, or bookmark...
Most Dangerous Celebrities 2017: #RT2Win a Hollywood Worthy Prize
“Hey hey, you you!” Did you hear that we released our 2017 Most Dangerous Celebrities List? This year marks the...
Most Dangerous Celebrity 2020 Sweepstakes
McAfee “Most Famous to Most Dangerous to Search for Online” 2020 MDC Sweepstakes Terms and Conditions NO PURCHASE OR PAYMENT...
Most Unwanted Criminals: Phishers, Shoulder Surfers and Keyloggers
McAfee’s most unwanted criminals have included pickpockets, Trojan viruses, and ATM skimmers, dumpster divers, spies, and wireless hackers and now...
MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters
Every year, more and more words are making it into the English dictionary. The next one to make its debut...
Mr. Coffee with WeMo: Double Roast
McAfee Advanced Threat Research recently released a blog detailing a vulnerability in the Mr. Coffee Coffee Maker with WeMo. Please...
Mr. Robot Gets Hacking Right. Here’s How
If you have an interest in cybersecurity and popular culture, do yourself a favor now: go watch Mr. Robot, USA...
Multi-tricks HiddenAds Malware
Thousands of HiddenAds Trojan Apps Masquerade as Google Play Apps The McAfee mobile research team has recently discovered a new...
Multiplatform Fake AV Uses Different GUIs
Since the beginning of October we have seen a variant of fake antivirus malware that belongs to the FakeRean family...
Multiple Java Exploits Hide in a Jar (File)
Exploits of the Java Runtime Environment (JRE) have been extensively used in drive-by-download toolkits such as Blackhole and Red Kit....
MWC 2017: What We Learned About the Mobile Landscape
MWC (Mobile World Congress) has come and gone yet again, and over the course of the four-day conference we’ve seen...
MWC 2018: Takeaways on the Key Devices and Innovations
It’s hard to believe that MWC 2018 is already over! Though the event came and went in the blink of...
MWC 2019: The Key to Establishing Digital Trust with Intelligent Connectivity
These days, it’s rare to walk into a home that doesn’t have a smart device in use. From voice assistants,...
MWC 2019: Why 5G + Fortnite = a win-win for criminals
So apparently, the company behind Fortnite has so much cash that it’s forming a $100 million prize fund for upcoming...
MWC Preview: Tailoring Security to the Modern Connected Lifestyle
In 2018, we’re officially living in the “future” imagined by popular 80s movies. No, we still don’t have flying cars,...
My Adventures Hacking the iParcelBox
In 2019, McAfee Advanced Threat Research (ATR) disclosed a vulnerability in a product called BoxLock. Sometime after this, the CEO...
My Best Online Tips To Get You Sorted For Christmas
Every year I promise myself I am going to be super organised for Christmas. Invariably, I fail. But this year,...