Featured Blogs
Cryptocurrency Laundering Service, BestMixer.io, Taken Down by Law Enforcement
A much overlooked but essential part in financially motivated (cyber)crime is making sure that the origins of criminal funds are...
RDP Stands for “Really DO Patch!” – Understanding the Wormable RDP Vulnerability
During Microsoft’s May Patch Tuesday cycle, a security advisory was released for a vulnerability in the Remote Desktop Protocol (RDP)....
Why AI Innovation Must Reflect Our Values in Its Infancy
This blog was written by Candace Worley, McAfee’s former Vice President and Chief Technical Strategist. In my last blog, I...
I am an AI Neophyte
This blog was written by Candace Worley, McAfee’s former Vice President and Chief Technical Strategist. I am an Artificial Intelligence...
Celebrating Mother’s Day: How McAfee Supports Expecting & Working Mothers
Mother. It’s one of the best, hardest, most rewarding, challenging and unpredictable jobs a woman can have. As we approach...
Why Data Security Is Important
The Increasing Regulatory Focus on Privacy The ongoing trend of data breaches and the increasing privacy risks associated with social...
LockerGoga Ransomware Family Used in Targeted Attacks
Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga,...
IoT Zero-Days – Is Belkin WeMo Smart Plug the Next Malware Target?
Effective malware is typically developed with intention, targeting specific victims using either known or unknown vulnerabilities to achieve its primary...
Employees Share Stories Working in Award–Winning Cork Office
“The culture at McAfee is easy going, fun, dynamic and everyone is friendly.”—Deirdre, Project Manager The McAfee office in Cork...
Federal, State Cyber Resiliency Requires Action
It is no shock that our state and local infrastructures are some of the most sought-after targets for foreign and...