Featured Blogs
Cerber Ransomware Evades Detection With Many Components
This blog was co-written by Sapna Juneja. Cerber is a quickly evolving type of malware called crypto-ransomware. Cerber encrypts files...
Banned Chinese Qvod Lives on in Malicious Fakes
Qvod used to be a popular video player and developer in China. Due to piracy allegations and a threatened fine,...
The State of Shamoon: Same Actor, Different Lines
Naming the recent data-wiping attacks in Saudi Arabia as a continuation of the Shamoon campaign suggests that we are dealing...
Mirai Botnet Creates Army of IoT Orcs
This post was based on analysis by Yashashree Gund and RaviKant Tiwari. There is a lot of speculation in the...
Rising to the Occasion as the New McAfee
This blog was written by Candace Worley, McAfee’s former Vice President and Chief Technical Strategist. As a new standalone company,...
A New McAfee, A New Posture: Staying Agile While Still Going Big
This post was written by John Giamatteo. Our culture has an edge to it. We’re not afraid to try new...
Being Central to McAfee Success
This blog was written by McAfee’s previous CFO Mike Berry. For me, the best role in a company is CFO....
Critical Office Zero-Day Attacks Detected in the Wild
At McAfee, we have put significant efforts in hunting attacks such as advanced persistent threats and “zero days.” Yesterday, we...
Remaining True in the Face of Incredible Responsibility
By now you’ve heard the news: Intel Security has officially rebranded to McAfee. But even though our company name has...
Day Two and Beyond
This blog was written by Brian Dye. It’s not often we get a chance to work on something truly amazing....