Featured Blogs
Additional Analysis into the SUNBURST Backdoor
Executive Summary There has been considerable focus on the recent disclosures associated with SolarWinds, and while existing analysis on the...
Actress Sofia Vergara’s Personal Photos Hacked or Stolen Via Mobile
In my line of work I get emails such as this one: “Hi Robert, I’m not sure if you saw...
Active iOS Smishing Campaign Stealing Apple Credentials
McAfee Mobile Research recently found an active phishing campaign targeting iOS users via SMS messages. The message tells users that their Apple...
Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation
Executive Summary Many malware attacks designed to inflict damage on a network are armed with lateral movement capabilities. Post initial...
Access Denied! New Instagram Hack Kicks Users Out of Their Accounts
Instagram is undoubtedly one of, if not the most popular social media platform among users today. Everyone from celebrities to...
A Year in Review: Threat Landscape for 2020
As we gratefully move forward into the year 2021, we have to recognise that 2020 was as tumultuous in the...
A Traveler’s Guide to International Cybersecurity
Have you ever lost your suitcase on vacation? You arrive at baggage claim, keeping your eyes peeled for your belongings....
A Snapshot: How to Keep Your Kids Safe on Instagram
“Mom, how do you block people on Instagram? I can’t figure it out,” yelled 13-year old Chloe casually from the...
A Simple Text Puts 95% of Android Devices in the Hotseat
Earlier this week, a new vulnerability was discovered, potentially afflicting up to 950 million Android devices. This accounts for nearly...
A Safer Internet for You, Your Family, and Others Too
With so many of us relying on the internet in ways we simply haven’t before, it follows that a safer internet is more important...
A Reflection on Mobile World Congress
This blog post was written by Nick Viney. As the dust settles on another busy year at Mobile World Congress,...
A Quick Guide to ‘Zero-Day Threats’ and How They Affect You
If you’re looking for a cybersecurity term that sounds intimidating and impressive to those who aren’t familiar with the field,...
A Quick Analysis of the Flash Player Opcode-Verifying Code Execution Vulnerability
On October 12, McAfee Labs learned of proof-of-concept code exploiting a newly patched Flash Player vulnerability. Adobe had patched this...
A PayPal Email Scam Is Making the Rounds: Here’s How to Identify and Avoid It
Payment applications make splitting restaurant bills, taxi fares, and household expenses so much easier. Without having to tally totals at...
A Parent’s Guide to TikTok
Finding someone who hasn’t heard of TikTok in 2022 would be quite the achievement. As one of the most popular...
A Parent’s Guide To The Metaverse – Part Two
Welcome back to part 2 of my Metaverse series. If you are after tips and strategies to help your kids...
A Parent’s Guide To The Metaverse – Part One
We’ve all heard about the Metaverse. And there’s no doubt it has certainly captured the attention of the world’s biggest...
A Parent’s Guide to ChatGPT
ChatGPT is, without doubt, the biggest tech story of the year. It’s created debate in schools and universities, made history...
A New Security Age Needs a New Approach to Security
Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption,...
A New Program for Your Peloton – Whether You Like It or Not
Executive Summary The McAfee Advanced Threat Research team (ATR) is committed to uncovering security issues in both software and hardware to help developers...
A New Android Banking Trojan Masquerades as Utility and Banking Apps in India
Authored by Dexter Shin Over the years, cyber threats targeting Android devices have become more sophisticated and persistent. Recently, McAfee...
A Look Beyond Their Lock Screens: The Mobile Activity of Tweens and Teens
While our tweens and tweens seem to grow into adults right before our eyes, their mobile usage matures into adulthood...
A Look Back: Top 5 Security Trends of 2012
As we look back on 2012, it’s impossible not to recall the many high-profile breaches and cybersecurity incidents that took...
A Look Back at the Equifax Data Breach, One Year Later
WannaCry, Petya, and Equifax first come to mind when you think of the most impactful cyber events in recent years,...
A look ahead to Mobile World Congress 2017
This blog post was written by Nick Viney. It’s nearly that time of year again! Next week, Mobile World Congress...
A Guide to Remove Malware From Your iPhone
Malicious software, or “malware,” refers to any program designed to infect and disrupt computer systems and networks. The risks associated...
A Guide to Identity Theft Statistics for 2023
There’s a digital counterpart for nearly everything we do, which means more of our personal information is online. And although...