Featured Blogs
McAfee Protects Against Doppelgänging Technique
This blog was co-written with Brook Schoenfield. That adversaries adopt new techniques is a known fact. However, the speed they...
Syn/Ack Unique Proactive Protection Technique
McAfee’s Advanced Threat Research team has performed analysis on samples of Syn/Ack ransomware implementing Process Doppelgänging. For those who are...
Get Your Online Privacy Under Control
Online privacy: too often managing this aspect of our digital lives gets shuffled to the bottom of our ‘to-do’ lists....
Malware on Google Play Targets North Korean Defectors
Earlier this year, McAfee researchers predicted in the McAfee Mobile Threat Report that we expect the number of targeted attacks on mobile devices to increase due to their ubiquitous growth combined with the sophisticated tactics used by malware authors.
Sensitive Data on 3 Million Facebook Users Potentially Exposed by Suspended App
From Facebook to Twitter and now back to Facebook – the past few months have seen some of the most...
Privacy Awareness Week-Are We Responsible for Our Data Breach?
“The best match for me,” announced my daughter one Sunday morning sometime back, “is a Scorpio.” “Oh really? And this...
Study: Digital Self-Harm Among Teens Real; Here’s What Parents Need to Know
When we think of self-harm, most of us think about rituals such as cutting in which a person may physically...
Global Community Service Day 2018: Together for good
By: Emily, Communications Program Manager When I finished college, I went to work for the same nonprofit youth sports organization...
It’s a Zoo Out There! Data Analysis of Alleged ZooPark Dump
In early May, researchers disclosed a Mobile malware campaign by a group focused on Middle Eastern targets. This actor was...
Why You Need To Know About “Cryptojacking”
As the value and quantity of digital currencies have rocketed, so too have the risks. In fact, crypto-related malware has...
Your Essential Checklist for Safely Watching this Summer’s Biggest Events Online
With several major European sporting events, music festivals and a huge royal wedding on the way, this summer is set...
America’s Dirty Little Secrets: Opening the Door to Protected Data
It’s 2018. Digital assistants have started taking over our homes, with adoption growing tenfold. These smart speakers know everything about...
VPNFilter Botnet Targets Networking Devices
VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.
3 Ways to Strengthen Your Family Bond this Summer (Without Ditching Your Devices)
My parents recently went through a health crisis that required me to travel to be with them for several weeks....
Send Your Kids Back to School with Cybersecurity Knowledge
Summer vacation is on and chances are that your kids are spending time indoors as the scorching sun makes it...
Women in the McAfee Channel
At McAfee, we work hard to advocate and empower women in what remains a male-dominated industry. Women currently make up...
High-Tech & Hackable: How to Safeguard Your Smart Baby Devices
It’s just about as creepy as it gets: A hacker breaking into a smart device in your baby’s nursery. The...
What the Mobile-Born Mean for IoT and Cybersecurity
Since before they knew how to walk, Gen Z – or the mobile-born generation – has had a wealth of...