Featured Blogs
Could a Dropped USB Drive Expose You to Malware?
USB drives seem harmless enough and they’re a convenient way to store, back up, or transfer files from your computer....
McAfee ATR Aids Police in Arrest of Rubella & Dryad Office Macro Builder
Everyday thousands of people receive emails with malicious attachments in their email inbox. Disguised as a missed payment or an...
Downloaded FaceApp? Here’s How Your Privacy Is Now Affected
If you’ve been on social media recently, you’ve probably seen some people in your feed posting images of themselves looking...
Demystifying Blockchain: Sifting Through Benefits, Examples and Choices
You have likely heard that blockchain will disrupt everything from banking to retail to identity management and more. You may...
School of Cyberthreats: 3 Attacks Impacting Today’s Schools
Educational institutions are data-rich gold mines. From student and employee records to sensitive financial information, schools contain a plethora of...
McAfee for McAfee: An Intern Journey
By Gwendolyn McAfee My grandfather always told me that I could achieve anything the world has to offer if I...
4 Ways for Parents to Handle the Facebook Messenger Bug
9 out of 10 children in the U.S. between the ages of six and twelve have access to smart devices....
No More Ransom Blows Out Three Birthday Candles Today
Collaborative Initiative Celebrates Helping More Than 200,000 Victims and Preventing More Than 100 million USD From Falling into Criminal Hands...
Examining the Link Between TLD Prices and Abuse
This blog was written by Charlie Feng. Briefing Over the years, McAfee researchers have observed that certain new top-level Domains...
FOMO: How to Help Digital Kids Overcome the Feeling of Missing Out
What happens when you give hundreds of teenagers smartphones and unlimited access to chat apps and social networks 24/7? A...
Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423
In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft’s Jet Database Engine....
Capital One Data Breach: How Impacted Users Can Stay More Secure
Capital One is one of the 10 largest banks based on U.S. deposits. As with many big-name brands, cybercriminals see...
The Twin Journey, Part 1
Summary and Introduction: The recent changes in Windows 10, aiming to add case sensitivity (CS) at directory level, have prompted...
Clop Ransomware
This new ransomware was discovered by Michael Gillespie on 8 February 2019 and it is still improving over time. This...
DHCP Client Remote Code Execution Vulnerability Demystified
CVE-2019-0547 CVE-2019-0547 was the first vulnerability patched by Microsoft this year. The dynamic link library, dhcpcore.dll, which is responsible for...
5 Digital Risks That Could Affect Your Kids This New School Year
Starting a new school year is both exciting and stressful for families today. Technology has magnified learning and connection opportunities...
The McAfee Americas Channel Promise
In my 26th year at McAfee, my fourth leading the Americas Channel Organization, I wanted to take a step back...
The Twin Journey, Part 2: Evil Twins in a Case In-sensitive Land
In the first of this 3-part blog series, we covered the implications of promoting files to “Evil Twins” where they...