Featured Blogs
How Hackers Bypassed an Adobe Flash Protection Mechanism
The number of Flash Player exploits has recently declined, due to Adobe’s introduction of various measures to strengthen Flash’s security....
McAfee Uncovers Operation Honeybee, a Malicious Campaign Targeting Humanitarian Aid Groups
This post was written with contributions from Jessica Saavedra-Morales, Thomas Roccia, and Asheer Malhotra. McAfee Advanced Threat Research analysts have...
Key Mobile Threat Takeaways from the 2018 Mobile Threat Report
The term “mobile” has come to encompass a wide range of devices these days. Mobile devices have become much more...
How McAfee is Adapting to the Mobile Landscape with New Partnerships and Innovation
Mobile World Congress (MWC) 2018 is finally upon us, and mobile and security providers from around the world are in...
Is Your Teen Using Tinder? Here’s What You Need to Know
Teens are curious. It’s fun to meet and date people they don’t see in the hallways every day. It feels...
Together We Are Forming a Powerful Alliance Against the Bad Guys
McAfee Security Innovation Alliance (SIA) is a technology ecosystem designed to assemble the world’s leading security innovations to form a...
New McAfee Report Reveals Identity Theft is the Most Expensive Form of Property Crime
Between Uber, Equifax, and a handful of others, the U.S. has witnessed major data breaches in the past year that...
DDoS Attacks in the Netherlands Reveal Teen Gamers on Troublesome Path
At the end of January, the Netherlands was plagued by distributed denial of service (DDoS) attacks targeting various financial institutions,...
MWC Preview: Tailoring Security to the Modern Connected Lifestyle
In 2018, we’re officially living in the “future” imagined by popular 80s movies. No, we still don’t have flying cars,...
What Are Serverless Apps?
The smartphone market has exploded in recent years, leading to the development of over 4 million mobile apps. For mobile...