Featured Blogs
The Twin Journey, Part 1
Summary and Introduction: The recent changes in Windows 10, aiming to add case sensitivity (CS) at directory level, have prompted...
Capital One Data Breach: How Impacted Users Can Stay More Secure
Capital One is one of the 10 largest banks based on U.S. deposits. As with many big-name brands, cybercriminals see...
Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423
In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft’s Jet Database Engine....
What Is Mshta, How Can It Be Used and How to Protect Against It
The not-so Usual Suspects There is a growing trend for attackers to more heavily utilize tools that already exist on...
FOMO: How to Help Digital Kids Overcome the Feeling of Missing Out
What happens when you give hundreds of teenagers smartphones and unlimited access to chat apps and social networks 24/7? A...
Examining the Link Between TLD Prices and Abuse
This blog was written by Charlie Feng. Briefing Over the years, McAfee researchers have observed that certain new top-level Domains...
No More Ransom Blows Out Three Birthday Candles Today
Collaborative Initiative Celebrates Helping More Than 200,000 Victims and Preventing More Than 100 million USD From Falling into Criminal Hands...
4 Ways for Parents to Handle the Facebook Messenger Bug
9 out of 10 children in the U.S. between the ages of six and twelve have access to smart devices....
McAfee for McAfee: An Intern Journey
By Gwendolyn McAfee My grandfather always told me that I could achieve anything the world has to offer if I...
School of Cyberthreats: 3 Attacks Impacting Today’s Schools
Educational institutions are data-rich gold mines. From student and employee records to sensitive financial information, schools contain a plethora of...