Featured Blogs
Elevate Your Financial Security: How to Safely Bank Online
Today’s technology allows you to complete various tasks at the touch of a button wherever you go. As a result, you place trust in online services that make...
Keep the Change: 3 Tips for Using the Twitter Tip Jar
When we think of tipping, many don’t see it as anything beyond a display of gratitude. However, Twitter’s latest feature is prompting its users to rethink this sentiment. It hasn’t been long since Twitter...
At Home or On-the-Go: Boost Your Internet Safety this Summer
Summer is here, which means more sun and more fun for everyone. It also means more streaming, gaming, and downloading. This seasonal reality reminds...
Potentially Malicious Apps Your Kids May Use
It’s a question I get several times a year from anxious parents, either via a direct message, an email or even in line at the grocery store....
A Safer Internet for You, Your Family, and Others Too
With so many of us relying on the internet in ways we simply haven’t before, it follows that a safer internet is more important...
What Is a Data Breach and How Do You Avoid It?
A data breach occurs when cybercriminals steal information from an organization’s database without permission from the owner or administrator. Data...
Apple Users: This macOS Malware Could Be Spying on You
In 2018, Macs accounted for 10% of all active personal computers. Since then, popularity has skyrocketed. In the first quarter of 2021, Macs experienced 115% growth...
How to Teach Kids About Online Safety: A Guide
Kids are online now more than ever, not just during free time, but also during school time. It is impossible to always peek over their...
Are Virtual Machines the New Gold for Cyber Criminals?
Introduction Virtualization technology has been an IT cornerstone for organization for years now. It revolutionized the way organizations can scale...
How to Prepare for Your Child’s First Smartphone
If only more things in life came with training wheels; a child’s first smartphone could certainly use some. Like taking off the training wheels...
Is Your Peloton Spinning Up Malware?
[Disclaimer: The McAfee ATR team disclosed this vulnerability to Peloton and promptly started working together to responsibly develop and issue a patch within...
A New Program for Your Peloton – Whether You Like It or Not
Executive Summary The McAfee Advanced Threat Research team (ATR) is committed to uncovering security issues in both software and hardware to help developers...
The Rise of the Dark Web Gig Economy
The gig economy has become more prevalent in today’s world with the appeal and necessity of flexible work opportunities. Many...
Father’s Day Gift Ideas: Protecting the Tech You Give to Dad
A new piece of tech often tops the list of Father’s Day gifts. And while things such as wearable fitness devices, smart...
McAfee Labs Report Highlights Ransomware Threats
The McAfee Advanced Threat Research team today published the McAfee Labs Threats Report: June 2021. In this edition we introduce...
Homes, Not Just Devices: The New Consumer Cybersecurity
Over the last year, our relationship with digital technology has changed completely, and probably irrevocably. The pandemic has been bruising...
Analyzing CVE-2021-1665 – Remote Code Execution Vulnerability in Windows GDI+
Introduction Microsoft Windows Graphics Device Interface+, also known as GDI+, allows various applications to use different graphics functionality on video...
How I Seized McAfee’s Opportunities to Realize My Potential
This post was written by Emmanuel Making the most of opportunities and putting in the work with an employer who...
5 Ransomware Threats Canadians Need to Know
Every day you place your personal information in the hands of companies and trust that it will remain safe. However,...
3 Canadian Real Estate Scams You Should Know About
Across the country, Canadians are moving out of cities in droves to stretch their legs and call a larger plot...
Fuzzing ImageMagick and Digging Deeper into CVE-2020-27829
Introduction: ImageMagick is a hugely popular open source software that is used in lot of systems around the world. It...
The Future of Mobile: Trends from Mobile World Congress 2021
Today we wrap up Mobile World Congress (MWC) 2021. Whether you joined online or attended the hybrid conference in person, one...
New Ryuk Ransomware Sample Targets Webservers
Executive Summary Ryuk is a ransomware that encrypts a victim’s files and requests payment in Bitcoin cryptocurrency to release the...
The Ultimate Guide to Safe Sharing Online
We live in a world that thrives on digital connectivity. According to We Are Social, Canadians are now spending half a day more...
Microsoft Urges Customers to Update Windows as Soon as Possible
What happened Microsoft has shipped an emergency security update affecting most Windows users. This update partially addresses a security vulnerability known as PrintNightmare that could allow...
Zloader With a New Infection Technique
This blog was written by Kiran Raj & Kishan N. Introduction In the last few years, Microsoft Office macro malware...
Hancitor Making Use of Cookies to Prevent URL Scraping
This blog was written by Vallabh Chole & Oliver Devane Over the years, the cybersecurity industry has seen many threats...