Featured Blogs
Free Ransomware Available on Dark Web
The McAfee Advanced Threat Research team recently analyzed a ransomware-as-a-service threat that is available for free and without registration. This malware...
Could You Have a Toxic Relationship with Your Smartphone?
It’s the elephant in the room no one wants to talk about: our devotion to and dependence on our smartphones....
What Are Serverless Apps?
The smartphone market has exploded in recent years, leading to the development of over 4 million mobile apps. For mobile...
MWC Preview: Tailoring Security to the Modern Connected Lifestyle
In 2018, we’re officially living in the “future” imagined by popular 80s movies. No, we still don’t have flying cars,...
DDoS Attacks in the Netherlands Reveal Teen Gamers on Troublesome Path
At the end of January, the Netherlands was plagued by distributed denial of service (DDoS) attacks targeting various financial institutions,...
New McAfee Report Reveals Identity Theft is the Most Expensive Form of Property Crime
Between Uber, Equifax, and a handful of others, the U.S. has witnessed major data breaches in the past year that...
Together We Are Forming a Powerful Alliance Against the Bad Guys
McAfee Security Innovation Alliance (SIA) is a technology ecosystem designed to assemble the world’s leading security innovations to form a...
Is Your Teen Using Tinder? Here’s What You Need to Know
Teens are curious. It’s fun to meet and date people they don’t see in the hallways every day. It feels...
How McAfee is Adapting to the Mobile Landscape with New Partnerships and Innovation
Mobile World Congress (MWC) 2018 is finally upon us, and mobile and security providers from around the world are in...
Key Mobile Threat Takeaways from the 2018 Mobile Threat Report
The term “mobile” has come to encompass a wide range of devices these days. Mobile devices have become much more...
McAfee Uncovers Operation Honeybee, a Malicious Campaign Targeting Humanitarian Aid Groups
This post was written with contributions from Jessica Saavedra-Morales, Thomas Roccia, and Asheer Malhotra. McAfee Advanced Threat Research analysts have...
How Hackers Bypassed an Adobe Flash Protection Mechanism
The number of Flash Player exploits has recently declined, due to Adobe’s introduction of various measures to strengthen Flash’s security....
6 Tips to Help Protect and Improve Your Child’s Online Reputation
Not the better choice. Take it down, please. That’s the short, efficient text message I’ve sent more times than I...
Using the Internet as a Medium For Women To Break The Glass Ceiling
“You know, the internet has done wonders for my business,” said a lady baker to me, beaming at all the...
MWC 2018: Takeaways on the Key Devices and Innovations
It’s hard to believe that MWC 2018 is already over! Though the event came and went in the blink of...
McAfee CEO Chris Young Talks About the Impact of Connected Devices in MWC 2018 Keynote
MWC 2018 came and went in the blink of an eye and new mobile innovations and exciting announcements emerged from...
McAfee Employees Share How They #PressForProgress on International Women’s Day
By Karla, Digital Media Specialist During the month of March, we’re excited to support International Women’s Day (March 8) and...
Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant
This post was prepared with contributions from Asheer Malhotra, Charles Crawford, and Jessica Saavedra-Morales. On February 28, the McAfee Advanced...