Featured Blogs
DHCP Client Remote Code Execution Vulnerability Demystified
CVE-2019-0547 CVE-2019-0547 was the first vulnerability patched by Microsoft this year. The dynamic link library, dhcpcore.dll, which is responsible for...
5 Digital Risks That Could Affect Your Kids This New School Year
Starting a new school year is both exciting and stressful for families today. Technology has magnified learning and connection opportunities...
The McAfee Americas Channel Promise
In my 26th year at McAfee, my fourth leading the Americas Channel Organization, I wanted to take a step back...
The Twin Journey, Part 2: Evil Twins in a Case In-sensitive Land
In the first of this 3-part blog series, we covered the implications of promoting files to “Evil Twins” where they...
MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play
The McAfee mobile research team has found a new type of Android malware for the MoqHao phishing campaign (a.k.a. XLoader...
23M CafePress Accounts Compromised: Here’s How You Can Stay Secure
You’ve probably heard of CafePress, a custom T-shirt and merchandise company allowing users to create their own unique apparel and...
Avaya Deskphone: Decade-Old Vulnerability Found in Phone’s Firmware
Avaya is the second largest VOIP solution provider (source) with an install base covering 90% of the Fortune 100 companies...
HVACking: Understanding the Delta Between Security and Reality
The McAfee Labs Advanced Threat Research team is committed to uncovering security issues in both software and hardware to help...
From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta
Management. Control. It seems that you can’t stick five people in a room together without one of them trying to...
How to Help Kids Steer Clear of Digital Drama this School Year
Editor’s note: This is Part II of helping kids manage digital risks this new school year. Read Part I. The...
McAfee AMSI Integration Protects Against Malicious Scripts
This blog describes how the AMSI (Antimalware Scan Interface) is used within the various McAfee products, and highlights some of the malware we are able to detect with it.
Dorms, Degrees, and Data Security: Prepare Your Devices for Back to School Season
With summer coming to a close, it’s almost time for back to school! Back to school season is an exciting...
The Twin Journey, Part 3: I’m Not a Twin, Can’t You See my Whitespace at the End?
In this series of 3 blogs (you can find part 1 here, and part 2 here), so far we have...
Backpacks Ready, Pencils Up – It’s Time for a Back-to-School #RT2Win
It’s time to unpack the suitcases and pack up those backpacks! With the summer season quickly coming to an end,...
How To Help Your Kids Manage Our ‘Culture of Likes’
As a mum of 4 sons, my biggest concerns about the era of social media is the impact of the...
How to Build Your 5G Preparedness Toolkit
5G has been nearly a decade in the making but has really dominated the mobile conversation in the last year...
The Cerberus Banking Trojan: 3 Tips to Secure Your Financial Data
A new banking trojan has emerged and is going after users’ Android devices. Dubbed Cerberus, this remote access trojan allows...
Digital Parenting: How to Keep the Peace with Your Kids Online
Simply by downloading the right combination of apps, parents can now track their child’s location 24/7, monitor their same social...