Featured Blogs
McAfee Defender’s Blog: Operation North Star Campaign
Building Adaptable Security Architecture Against the Operation North Star Campaign Operation North Star Overview Over the last few months, we...
Operation (노스 스타) North Star A Job Offer That’s Too Good to be True?
Executive Summary We are in the midst of an economic slump [1], with more candidates than there are jobs, something...
How to Wipe Out a Computer Virus
In this article, you’ll learn some of the signs that you may have a computer virus, and you’ll learn tips...
How to Remove Trojan Horse Viruses
Basic online scenario—You log onto your computer and notice that something’s just not right, but you can’t quite put your...
Security is a Feeling- With the McAfee #SecureMyLife RT2Win Sweepstakes!
Security is a Feeling- Share it with the McAfee #SecureMyLife RT2Win Sweepstakes! The word ‘security’ means something unique to everyone....
What is a McAfee Internship Like? 10 Interns Share Perspectives
At McAfee, we foster meaningful internship experiences within our fast-paced world of cybersecurity. We know it’s the next generation that will build tomorrow’s technology solutions. McAfee interns make substantial contributions and are valued as global team members, joining our...
Women in Sales Part 2: Skilling up for a Career in Cybersecurity Sales
McAfee fosters an inclusive environment where we value varied life experiences. To showcase women who are making an impact and inspire others, we launched our Women in Sales Series. In Part 1, McAfee...
Smartphone Alternatives for Free-Ranging Kids
Smartphone Alternatives for Free-Ranging Kids A popular topic in our blogs is “when to buy a child a smartphone,” and...
How to Keep Remote Learning Pod Students Safe Online
The upheaval of 2020 has forced us all to reimagine familiar pathways, and parents are no exception. Cautious about sending...
Take a “NetWalk” on the Wild Side
Executive Summary The NetWalker ransomware, initially known as Mailto, was first detected in August 2019. Since then, new variants were...
McAfee Defender’s Blog: NetWalker
Building Adaptable Security Architecture Against NetWalker NetWalker Overview The NetWalker ransomware, initially known as Mailto, was first detected in August...
Special Delivery: Criminals Posing as Amazon Are Out to Steal User’s Data
One of the joys of online shopping is instant gratification – your purchases arrive on your doorstep in just a few...
My Experience as a Finance Intern at McAfee for Summer 2020
By: Nilisha, Finance Intern, Plano, TX, United States Amidst this global pandemic, I was fortunate enough to have the opportunity...
Ripple20 Critical Vulnerabilities – Detection Logic and Signatures
This document has been prepared by McAfee Advanced Threat Research in collaboration with JSOF who discovered and responsibly disclosed the...
Call an Exorcist! My Robot’s Possessed!
Overview As part of our continued goal of helping developers provide safer products for businesses and consumers, we here at...
Robot Character Analysis Reveals Trust Issues
Retired Marine fighter pilot and Top Gun instructor Dave Berke said “Every single thing you do in your life, every...
Women in Sales Part 3: Traits for Success in Cybersecurity Sales
At McAfee, women are finding the inclusiveness and tools to succeed in cybersecurity sales, a field often misconceived because of its technical background. They are doing...
Cyberbullying’s Impact on Both Society and Security
More than half of children say that a cyberbully targeted them online. That disquieting stat comes from our recent global...
What Security Means to Elders
What Security Means to Elders Recently, we conducted a survey of 600 families and professionals in the U.S. to better...
Vulnerability Discovery in Open Source Libraries Part 1: Tools of the Trade
Executive Summary Open source has become the foundation for modern software development. Vendors use open source software to stay competitive...
How To Secure Your Car’s Computer
Just like any other technological device, car computer systems aren't immune to cyber threats. Cybersecurity attacks on cars can pose serious safety threats and privacy issues.
How to Date Safely Online
If you are a young person looking for your ‘special someone’ then 2020 would have seriously cramped your style. Whether...
On Drovorub: Linux Kernel Security Best Practices
Intro In a U.S. government cyber security advisory released today, the National Security Agency and Federal Bureau of Investigation warn...
Back-to-School: Prepping Your Tech for Learning Pods or Micro School
Back-to-School: Prepping Your Tech for Learning Pods or Micro School With a new academic year starting up, the look of...
Back-to-School: Could Your Remote Learner Be Cyber Cheating?
Back-to-School: Could Your Remote Learner Be Cyber Cheating? As families across the country ramp up for the new school year,...
ScamsWeek2020
Here’s How to Be Yourself and NOT let a Scammer Be You! If you hadn’t truly embraced the incredible benefits...
What Security Means to Professionals
What Security Means to Professionals Recently, we conducted a survey of 600 families and professionals in the U.S. to better...