Featured Blogs
Digital Literacy Decoded – Time to Reprise Our Roles as Digital Citizens
Celebrated every year on September 8, this year’s theme for International Literacy Day focused on “Literacy and Skills Development.” And...
Digital Family Digest: Online Safety News You May Have Missed
New Study: Bullying Having Serious Impact on Kids Researchers at Florida Atlantic University and the University of Wisconsin-Eau Claire (UW-EC) recently...
Digital Divorce: Who Gets the Airline Miles and Music Files?
Something you’ll want to know about all those movies, mp3s, eBooks, air miles, and hotel points you’ve accrued over the years: they’re digital assets that can factor...
Digital Dares: Dumb Kids with Smart Phones
Do you remember the guy or girl in high school who always took things just a little too far? If...
Digital Assistants, Cryptocurrency, Mobile Malware: ‘McAfee Labs Threats Report’ Trends
Every three months, our team crafts the McAfee Labs Threats Report. The quarterly report ranges in topic and severity but always...
Digging Into the Sandbox-Escape Technique of the Recent PDF Exploit
As promised in our previous blog entry for the recent Adobe Reader PDF zero-day attack, we now offer more technical...
Digging Into the Nitol DDoS Botnet
Nitol is a distributed denial of service (DDoS) botnet that seems to be small and not widely known. It mostly...
Digging Into a Windows Kernel Privilege Escalation Vulnerability: CVE-2016-7255
This blog was written by Stanley Zhu. The Windows kernel privilege escalation vulnerability CVE-2016-7255 has received a lot of media...
Did You Forget to Patch Your IP Camera?
IP cameras are usually “purchase, install, and don’t touch” devices. But in the current climate of cyberattacks, they now require...
Did You Check Your Quarantine?!
A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the...
DHS Accelerates Information Sharing Standards Effort; McAfee to Chair Working Group
This post first appeared at Policy@Intel on March 9. In an effort to accelerate cyber information sharing, and in response...
DHCP Client Remote Code Execution Vulnerability Demystified
CVE-2019-0547 CVE-2019-0547 was the first vulnerability patched by Microsoft this year. The dynamic link library, dhcpcore.dll, which is responsible for...
Devices and Distancing: What Digital Data Says About Life From Home
Devices and Distancing: What Digital Data Says About Life From Home With millions of us keeping life closer to home...
Device & App Safety Guide for Families
While we talk about online safety each week on this blog, October is National Cybersecurity Awareness Month (NCSAM), a time...
Determined to Find Love Online in 2018? Here are 5 Ways to Protect Your Privacy
It turns out January is the busiest month for online dating since millions of singles have resolved to embark on...
Despite Decline in Use of Adobe Flash, Vulnerabilities Will Continue to Cause Concern
This post was researched and written by Brook Schoenfield with the assistance of Tim Hux, Abhishek Karnik, Asheer Malhotra, and...
Depression in Teens: How to Spot It, What to Do Next
Instagramming, tweeting, posting, and snap chatting. It’s the social culture of the young adults around us but at what cost to...
Demystifying Blockchain: Sifting Through Benefits, Examples and Choices
You have likely heard that blockchain will disrupt everything from banking to retail to identity management and more. You may...
Delving Deeply Into a Bitcoin Botnet
Bitcoin is a virtual decentralized currency that was created in 2009 by developer Satoshi Nakamoto, who described the currency in...
DEFCON – Connected Car Security
Sometime in the distant past, that thing in your driveway was a car. However, the “connected car is already the...
Deepfakes of Prince William Lure Social Media Users into an Investment Scam
Deepfakes of Prince William and the UK Prime Minister are pushing investment scams on Facebook and Instagram. Uncovered by Fenimore...
Deepfake Drama: How Gwyneth Paltrow Became the Latest Target in AI Deception
As technology advances, so do the methods used by cybercriminals to spread misinformation and scams. One of the most concerning...
Deepfake Defense: Your 8-Step Shield Against Digital Deceit
A disturbing story out of western Spain spotlights challenges of technological evolution. Unwitting children and teenagers were victims of users...
Decyphering the Noise Around ‘Meltdown’ and ‘Spectre’
The McAfee Advanced Threat Research (ATR) Team has closely followed the attack techniques that have been named Meltdown and Spectre...
Deconstructing Amadey’s Latest Multi-Stage Attack and Malware Distribution
Authored by By Yashvi Shah McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at...
Deadly Digital Dares: The Blackout Challenge on TikTok
The social network TikTok is chockfull of interesting, fun, laugh-out-loud videos shared by creators worldwide. Kids, as well as parents,...
DDoS Attacks in the Netherlands Reveal Teen Gamers on Troublesome Path
At the end of January, the Netherlands was plagued by distributed denial of service (DDoS) attacks targeting various financial institutions,...