Featured Blogs
Every Step You Take, Every Call You Make: Is Your Phone Watching You?
Imagine a world where every mobile move you make – each text message and phone call – is broadcast to...
Every Step You Take, Every Call You Make: Is Your Phone Tracking You?
So, what does your phone know about you? Taken all together it knows plenty — sometimes in ways that feel...
Evasion Techniques: Encoded JavaScript Attacks PDF Files
Last week I kicked off a series of blogs with a discussion of how an effective IPS solution can fight...
Entertainment #FromHome: What to do When You’re Bored at Home
Entertainment #FromHome: What to do when you’re bored at home If your queue of movies and shows are looking...
Entertainment #FromHome: How to start your own podcast
How to start your own podcast Start your own podcast? Why not? Instead of streaming someone else’s show, maybe it’s...
Entertainment #FromHome: Photo Backups, Digital Picture Frames, and More!
Entertainment From Home: Back up your photos, create digital picture frames, and more! One thing many of us have is...
ENS 10.7 Rolls Back the Curtain on Ransomware
Ransomware protection and incident response is a constant battle for IT, security engineers and analysts under normal circumstances, but with...
End the Hate: 10 Ways to Stand Up and Help Stomp Out Bullying
Bullying can cause immense physical and emotional pain, leading to decreased self-esteem, increased anxiety, and even suicide in extreme cases. Given its severe potential consequences, it’s critical for every one of us to take steps to end the hate.
Encrypted Messaging Service Hack Exposes Phone Numbers
Many people opt for encrypted messaging services because they like the additional layers of privacy they offer. They allow users...
Employees Share Stories Working in Award–Winning Cork Office
“The culture at McAfee is easy going, fun, dynamic and everyone is friendly.”—Deirdre, Project Manager The McAfee office in Cork...
Emotet’s Uncommon Approach of Masking IP Addresses
Authored By: Kiran Raj In a recent campaign of Emotet, McAfee Researchers observed a change in techniques. The Emotet maldoc...
Emotet Trojan Acts as Loader, Spreads Automatically
Since the middle of July, McAfee has observed new updates of the Emotet, a Trojan that was first discovered in...
Emotet Downloader Trojan Returns in Force
During the past couple of days, we have seen an increase in activity from Emotet. This Trojan downloader spreads by...
Emma Watson Video Scam: Hackers Use Celeb’s Popularity to Unleash Viruses
Following the announcement of the 2014 Most Dangerous Celebrities™ earlier this month, our senses have been heightened to scams on...
Emilia Clarke Is the Most Dangerous Game of Thrones® Celebrity
The net is dark and full of terrors, especially for fans of HBO’s popular show Game of Thrones®. As followers...
Emerging ‘Stack Pivoting’ Exploits Bypass Common Security
[This blog was primarily written by Xiaoning Li of McAfee Labs, with assistance from Peter Szor of McAfee Labs.] In...
EMEA Channel Partner Summit: The highlights
This blog was written by David Small. As we look ahead to our annual FOCUS Security conference, a three day...
Embrace change! Chris’s McAfee Journey
In this career-journey series, Internal Audit Manager Chris shares his recent journey joining the McAfee finance team and why he...
Email Hackers, Go Home! New Security Updates Come to Gmail
Email has been an integral part of our culture for more than two decades now. It seems like just yesterday...
Ellen DeGeneres Instagram Hack: What You Can Do to Protect Your Account
Today was not an easy morning for Ellen DeGeneres. She woke to find that her Instagram account was briefly hacked...
Elevate Your Financial Security: How to Safely Bank Online
Today’s technology allows you to complete various tasks at the touch of a button wherever you go. As a result, you place trust in online services that make...
Electronics in Flight: How Harmful are Mobile Devices to Your Aircraft?
We all know the drill: before takeoff and landing the flight attendants do a final safety inspection, walking up and...
Election 2020: Make Sure Your Voice is Heard with These Tips
Election 2020: Make Sure Your Voice is Heard with These Tips & Best Practices Last year, India exercised one of...
Election 2020: Lookout for Fake News Before and After the Election
Election 2020: Keep on the Lookout for Fake News Before and After the Election As the news and conversations leading...
Election 2020 – Keep Misinformation from Undermining the Vote
Election 2020 – Keep Misinformation from Undermining the Vote On September 22nd, the Federal Bureau of Investigation (FBI) and the...
Election 2020 – How to Spot Phony Deepfake Videos this Election
Election 2020 – How to Spot Phony Deepfake Videos this Election Maybe you’ve seen videos where Robert Downey Jr. and...
Election 2020 – Five Tips to Secure a Mail-In Ballot That Counts
Election 2020 – Five Tips to Secure a Mail-In Ballot That Counts Forecasts predict that roughly 80 million votes will...