Featured Blogs
In NTDLL I Trust – Process Reimaging and Endpoint Security Solution Bypass
Process Reimaging Overview The Windows Operating System has inconsistencies in how it determines process image FILE_OBJECT locations, which impacts non-EDR...
Inclusion Drives Innovation: An Employee’s Perspective on Being Differently Abled
By Karla Jackson, Digital Media Specialist, McAfee “With Our People at The Heart, We Are McAfee.” If you make your...
Independent Lab Tests Show that McAfee Stops Malware Dead in Its Tracks
Concerned about ransomware? McAfee stops it dead in its tracks. Newly published findings from the independent labs at AV-TEST show...
Indian Digital Citizens Need to Better Balance Their Device Use and Manage Online Safety
As Bryan Adams croons in the background (Everything I do) I do it for you…. and you give the last...
Indians Are Increasingly Realising Nothing Said Online Is Private
The world is becoming increasingly connected- with locks for you home controlled on your smartphone; CCTV cameras in every room...
Infected Minecraft Apps Could Potentially Turn Over 2M Android Devices Into a Botnet Army
We all love a good game, especially those that allow us to create and innovate with the touch of our...
Information Operations an Integral Part of Cyberwarfare
Weapons and the skills to use them are not the only decisive elements in warfare. Rhetoric and imagery are important,...
Inside a Modern-Day Smart Home
Ever wonder how the Internet of Things (IoT) first began? Often regarded as the first IoT device, John Romkey created...
Inside Adobe Reader Zero-Day Exploit CVE 2011-2462
Recently a critical vulnerability has been identified in Adobe Reader X and Adobe Acrobat X Versions 10.1.1 and earlier for...
Insider Threat at Coca-Cola Compromises 8,000 Employees’ Information
Cybercrime is often seen as a battle of good versus evil – a hacker tries to infiltrate a system while...
Insights on the Capabilities of Three Politically-Themed Ransomware Campaigns
We all hear politicians’ names week over week – what policies they’re working on, new initiatives they’re implementing for their...
Instagram credentials Stealer: Disguised as Mod App
Authored by Dexter Shin McAfee’s Mobile Research Team introduced a new Android malware targeting Instagram users who want to increase...
Instagram credentials Stealers: Free Followers or Free Likes
Authored by Dexter Shin Instagram has become a platform with over a billion monthly active users. Many of Instagram’s users...
Instagram Direct: What Parents Need to Know
We’ve written a lot about Instagram and SnapChat; both are popular photo/video sharing apps for teens and both pose threats to...
Instagram Direct: Your Private Messages to Marketers
A picture may really be worth a thousand words when it comes to how we communicate and consume media on...
Instagram Hack Results in $1 Million Loss in NFTs
Imagine – your favorite brand on Instagram just announced a giveaway. You’ll receive a free gift! All you have to...
Instagram Has Hopped Aboard the 2FA Authentication Train Plus A Quiz for #SocialMediaDay
[os-widget path=”/mcafee/how-safe-are-you-on-social-media” of=”mcafee” comments=”false”] With over 500 million users, Instagram has quickly become one of the top dogs of social...
Instagram Safety for Kids: Protecting Privacy and Avoiding Risks
If you’re a parent of a teen, there’s a good chance that Instagram is the culprit behind a good chunk...