Featured Blogs
STEM – How and Why To Get Your Daughter Involved
In 1990, the buzz around STEM (science, technology, engineering and maths) just didn’t exist. When I was doing my HSC,...
Marcher Malware Uses Both Credential and Credit Card Phishing to Steal Financial Data
Actors turned models turned singers — pretty much the definition of a “triple threat” in the entertainment industry. However, the...
Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack
This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...
Kids Glued to YouTube? Here are 7 Ways to Keep them Safe While Having Fun
I spend a lot of time on YouTube. I watch health, parenting, and cooking videos until my eyes cross. And...
Self-Signed Certificates Can Be Secure, So Why Ban Them?
This blog was co-written by Brook Schoenfield and Ramnath Venugopalan. In many organizations the use of self-signed certificates is forbidden...
Massive Malaysian Data Breach Compromises Over 46 Million Phone Numbers
There are data breaches that impact an entire customer group, or even a certain state. And then there are data...
Be a Social Media-Savvy Parent For Your Kids
If your kids are ready to join the social media bandwagon, but you are completely lost when it comes to...
Pirate Versions of Popular Apps Infiltrate Google Play via Virtualization
The McAfee Mobile Research team recently found pirated applications of popular apps distributed on the Google Play store. A pirated...
Secret Selfies: iPhone Apps Can Take Pictures and Videos of You Without Your Knowledge
“Let’s take a selfie” has become quite the popular request in 2017. Most everyone captures the occasional self-portrait using the...
Celebrating Halloween – McAfee Style
By Dawson McPherson, Talent & Communications Coordinator Two weeks ago, I stepped into the McAfee Plano office with a mixture...