Featured Blogs
CurveBall – An Unimaginative Pun but a Devastating Bug
Enterprise customers looking for information on defending against Curveball can find information here. 2020 came in with a bang this...
You Bring the Yoga Mat, McAfee Brings the Goats
Yogis are likely familiar with the term vinyasa, but have you heard of caprine vinyasa? Caprine vinyasa elevates your standard...
An Inside Look into Microsoft Rich Text Format and OLE Exploits
There has been a dramatic shift in the platforms targeted by attackers over the past few years. Up until 2016,...
Where’s the Truth Online? How to Build Your Family’s Digital Discernment
Note: This is Part I of a series on equipping your family fight back against fake news online. Fake news...
Take Action This Data Privacy Day
We all know that data breaches have been on the rise, and hackers are finding clever, new ways to access...
Security Lessons From 2019’s Biggest Data Breaches
2019 already feels like it’s worlds away, but the data breaches many consumers faced last year are likely to have...
Spotting Fake News: Teaching Kids to be Responsible Online Publishers
Editor’s note: This is part II in a series on Fake News. Read part I, here. Kids today are not...
U.S. Battleground County Website Security Survey
Today McAfee released the results of a survey of county websites and county election administration websites in the 13 states...
How To Protect Your Vote During Election
The 2020 U.S. presidential primaries are right around the corner. As people gear up to cast their ballots for party...
McAfee’s Women in Security Offer New Grads Career Insights
Launching your career is an exciting milestone, one that can also be nerve-wracking though. Chances are questions like What should...
7 Conversations to Help Build Up Your Family’s Digital Literacy Skills
With the surge of misleading content online, helping your child learn to become an independent thinker is no small task....
Safer Internet Day 2020
What Can You Do To Make The Internet a Better Place In 2020, you’d be hard-pressed to find an Aussie...
Intelligence in the Enterprise
Intelligence became an integral military discipline centuries ago. More recently, this practice evolved into what is called Intelligence Preparation of the Battlefield,...
Knock, Knock – Who’s There?
A Windows Linux Subsystem Interop Analysis Following our research from Evil Twins and Windows Linux Subsystem, interoperability between different WSL...
How You (and Your Teen) Can Stay Safe While Looking for Love Online
Valentine’s Day is such a double-edged sword. If you’re feeling the love and just can’t get enough of your sweetheart...
Timeless Principles to Help Your Child Develop Social Superpowers
“You can make more friends in two months by becoming interested in other people than you can in two years...
Consumers want a fully connected life – but at what cost?
Convenience has always, and will always be king. That’s why it’s no surprise that the average person is collecting connected...
Introduction and Application of Model Hacking
Catherine Huang, Ph.D., and Shivangee Trivedi contributed to this blog. The term “Adversarial Machine Learning” (AML) is a mouthful! The...
Model Hacking ADAS to Pave Safer Roads for Autonomous Vehicles
The last several years have been fascinating for those of us who have been eagerly observing the steady move towards...
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II
In our first article we discussed the growing pattern of targeted ransomware attacks where the first infection stage is often...
TikTok Challenge, Hoop App, and Other Headlines You May Have Missed
Digital news that affects families seems to be dominating the headlines these days. To keep parents in the know, here...
Frequently Asked Questions About Identity Theft
The more you know about identity theft, the better prepared you will be to prevent it from happening to you. Here are some commonly asked questions about identity theft.
How vulnerability disclosure keeps you and your family safe
Surrounded by smart home devices as well as apps which integrate with other services, we are entering an age of...
Burning Man Is Coming: How to Watch out for Ticket Scammers
As the winter months fade and spring begins to creep up, many millennials and Gen Zers set their sights on...
Is the TikTok App Safe for Kids?
Everyone’s talking about the TikTok app. In addition to talking, tweens and teens are swiping, laughing, and sharing TikTok videos....
Multi-tricks HiddenAds Malware
Thousands of HiddenAds Trojan Apps Masquerade as Google Play Apps The McAfee mobile research team has recently discovered a new...
Android/LeifAccess.A is the Silent Fake Reviewer Trojan
The McAfee Mobile Research team has identified an Android malware family dubbed Android/LeifAccess.A that has been active since May 2019....
