Featured Blogs
The Future of Mobile in a Post-COVID World & How to Stay Secure
The COVID-19 pandemic forced many of us to quickly adjust to the new normal — case and point, admitted that...
How to Make Telehealth Safer for a More Convenient Life Online
Among the many major shifts in lifestyle during the COVID-19 pandemic, the way we used healthcare was one of the...
Small Businesses Save Up to 60% in McAfee and Visa Partnership
Small business owners are getting a special deal on their online protection through a partnership between McAfee and Visa. With new ways of working creating online opportunities and risks for...
COVID-19 Vaccine Passports: 5 Security Tips for You and Your Family
Depending on where your travels take you, you might need a new passport—a COVID-19 vaccine passport. In an effort to kickstart travel...
REvil Ransomware Uses DLL Sideloading
This blog was written byVaradharajan Krishnasamy, Karthickkumar, Sakshi Jaiswal Introduction Ransomware attacks are one of the most common cyber-attacks among...
An Overall Philosophy on the Use of Critical Threat Intelligence
The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and...
McAfee Partners with American Express to Provide Best-in-Class Security
With the increase in online activities due to the COVID-19 pandemic, consumers are potentially becoming exposed to more online threats,...
Fighting new Ransomware Techniques with McAfee’s Latest Innovations
In 2021 ransomware attacks have been dominant among the bigger cyber security stories. Hence, I was not surprised to see...
How to Secure Your Smart Home: A Step-by-Step Guide
How many rooms in your home contain a smart device? From Peloton bikes to showerheads with Bluetooth speakers, smart home technology is rapidly making its way into every room in...
My Journey from Intern to Principal Engineer
Written by Shuborno, Principal Engineer At McAfee, architects and engineers continuously have opportunities to make decisions that impact customers and...
9 Tips to Help Kids Avoid Popular App Scams
There’s a lot of conversation going on right now around digital apps; only it’s not about TikTok or Twitch. Instead, it’s about the spike in the number...
What is a VPN and Can it Hide My IP Address?
There’s a lot of misinformation about Virtual Private Networks, what they do, and the security benefits they offer. For this article, I’d like to do...
It’s All About You: McAfee’s New All-Consumer Focus
This week, McAfee took an exciting new step in our journey—we are now a pure-play consumer company. What does that...
Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems?
Co-written with Northwave’s Noël Keijzer. Executive Summary For a long time, ransomware gangs were mostly focused on Microsoft Windows operating...
The New McAfee: A Bold New World of Protection Online
This news has been some time in the making, and I’m terrifically excited to share it. As of July 27th, we take a...
7 Safety Tips to Schooling in a Digital World
This fall, many students are headed back-to-school full time. However, just as workplaces now accommodate for remote work, schools are...
How to Protect Yourself From XLoader Malware
Picture this: you open your MacBook and see an email claiming to be from your favorite online store. In the email,...
XLSM Malware with MacroSheets
Written by: Lakshya Mathur Excel-based malware has been around for decades and has been in the limelight in recent years. During the second half of 2020, we saw...
Chipotle’s Marketing Account Hacked: Protect Yourself From Phishing Lures
Over the past few years, food delivery apps have made it easy for people to get their favorite cuisines brought...
The Rise of Deep Learning for Detection and Classification of Malware
Co-written by Catherine Huang, Ph.D. and Abhishek Karnik Artificial Intelligence (AI) continues to evolve and has made huge progress over the last decade. AI shapes our daily lives. Deep learning is a subset of techniques in AI that...
6 Tips for a Safer and Easier Telemedicine Visit
We’ve all been there. It’s the middle of the night and you wake up to a sad and sniffly kiddo...
Back-to-School: Privacy Worries in a Remote Learning World
As the new school year gets underway, many students will be returning to the classroom in-person, while others will opt...
Younger, But Not Savvier: 3 Cybersecurity Threats Plaguing Millennials
Surprise! Just because you’re a Millennial or Gen Zer doesn’t mean you’re savvier when it comes to technology. Especially when it comes...
4 Viral Apps Risking Your Personal & Smartphone Security
Mobile phones have gone through an incredible transformation since their inception in the 1970s. Now, the sheer number of applications is dizzying, as are their...
T-Mobile’s data breach exposes the personal data of 40 million
T-Mobile, the popular US mobile phone service provider, recently confirmed a data breach affecting 7.8 million current customers and 40 million records from past or prospective customers. The...
Can Your Wearable Health Monitors Be Compromised?
More senior adults are taking advantage of the array of wearable technology that helps them stay connected to healthcare providers and monitor their physical health and safety. But that newfound convivence comes with risk and, for many, the genuine fear...
Uber Data Breach and How to Protect Your Info
The Latest on the Uber Data Breach and Protecting Your Info You may have spotted the news last week that...