Featured Blogs
How Chinese Cybercriminals Use Business Playbook to Revamp Underground
Preface Because of its longevity and technical sophistication, the Russian cybercriminal underground has long been the benchmark for threat researchers...
Knock, Knock – Who’s There?
A Windows Linux Subsystem Interop Analysis Following our research from Evil Twins and Windows Linux Subsystem, interoperability between different WSL...
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I
For many years now I have been working and teaching in the field of digital forensics, malware analysis and threat...
How You (and Your Teen) Can Stay Safe While Looking for Love Online
Valentine’s Day is such a double-edged sword. If you’re feeling the love and just can’t get enough of your sweetheart...
Timeless Principles to Help Your Child Develop Social Superpowers
“You can make more friends in two months by becoming interested in other people than you can in two years...
Consumers want a fully connected life – but at what cost?
Convenience has always, and will always be king. That’s why it’s no surprise that the average person is collecting connected...
Introduction and Application of Model Hacking
Catherine Huang, Ph.D., and Shivangee Trivedi contributed to this blog. The term “Adversarial Machine Learning” (AML) is a mouthful! The...
Model Hacking ADAS to Pave Safer Roads for Autonomous Vehicles
The last several years have been fascinating for those of us who have been eagerly observing the steady move towards...
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II
In our first article we discussed the growing pattern of targeted ransomware attacks where the first infection stage is often...
TikTok Challenge, Hoop App, and Other Headlines You May Have Missed
Digital news that affects families seems to be dominating the headlines these days. To keep parents in the know, here...
Frequently Asked Questions About Identity Theft
The more you know about identity theft, the better prepared you will be to prevent it from happening to you. Here are some commonly asked questions about identity theft.
How vulnerability disclosure keeps you and your family safe
Surrounded by smart home devices as well as apps which integrate with other services, we are entering an age of...
Burning Man Is Coming: How to Watch out for Ticket Scammers
As the winter months fade and spring begins to creep up, many millennials and Gen Zers set their sights on...
Is the TikTok App Safe for Kids?
Everyone’s talking about the TikTok app. In addition to talking, tweens and teens are swiping, laughing, and sharing TikTok videos....
Do I Need to Hide My IP Address?
New threats to our online privacy emerge every day, from relatively benign tracking of our activities for marketing purposes, to more invasive measures that can put our security at risk. This has led some people to wonder whether they should take steps to hide their IP address. In truth, it ...
Multi-tricks HiddenAds Malware
Thousands of HiddenAds Trojan Apps Masquerade as Google Play Apps The McAfee mobile research team has recently discovered a new...
Android/LeifAccess.A is the Silent Fake Reviewer Trojan
The McAfee Mobile Research team has identified an Android malware family dubbed Android/LeifAccess.A that has been active since May 2019....
Is Mobile Malware Playing Hide and Steal on Your Device?
Over the years, we’ve all grown accustomed to using our smartphones and mobile apps to support our lifestyles. We as...
McAfee Men Share Fresh Perspectives on Gender Equality
Every year, McAfee recognizes International Women’s Day and as part of our celebrations, we asked McAfee men around the world...
Celebrate International Women’s Day By Embracing a Career in Technology
This Sunday, we celebrate International Women’s Day, a global day for championing the social, economic, cultural, and political achievements of...
Is WhatsApp Safe for Kids? Here’s What Parents Need to Know
Kids use the messaging app WhatsApp to talk privately with friends, exchange content and videos, and (hopefully) fly under the parentals' radar. But is What'sApp safe for kids? Here's what parents need to know.
ST16: Top 5 RSA Moments 2020 with Vittorio Viarengo & Naveen Palavalli
RSA Conference Highlights McAfee’s Interim Chief Marketing Officer Vittorio Viarengo and VP of Product & Solution Marketing Naveen Palavallil team...
SMBGhost – Analysis of CVE-2020-0796
The Vulnerability The latest vulnerability in SMBv3 is a “wormable” vulnerability given its potential ability to replicate or spread over...
WhatsApp Security Hacks: Are Your ‘Private’ Messages Really Ever Private?
WhatsApp one of the largest instant messengers and considered by many a social network of its own. So, in continuing...
Honey, We’re Home! Securing Your Devices and Your Family Bond
More and more parents and their kids are experiencing what it’s like to work and learn together from home these...
Ransomware Maze
EXECUTIVE SUMMARY The Maze ransomware, previously known in the community as “ChaCha ransomware”, was discovered on May the 29th 2019...
Scams Facing Consumers in the New Digital WFH Landscape
With many people having their normal day to day life turned upside down, scammers are capitalizing on consumers’ newfound lifestyles to make a financial gain or...