Featured Blogs
A Quick Analysis of the Flash Player Opcode-Verifying Code Execution Vulnerability
On October 12, McAfee Labs learned of proof-of-concept code exploiting a newly patched Flash Player vulnerability. Adobe had patched this...
A PayPal Email Scam Is Making the Rounds: Here’s How to Identify and Avoid It
Payment applications make splitting restaurant bills, taxi fares, and household expenses so much easier. Without having to tally totals at...
A Parent’s Guide to TikTok
Finding someone who hasn’t heard of TikTok in 2022 would be quite the achievement. As one of the most popular...
A Parent’s Guide To The Metaverse – Part Two
Welcome back to part 2 of my Metaverse series. If you are after tips and strategies to help your kids...
A Parent’s Guide To The Metaverse – Part One
We’ve all heard about the Metaverse. And there’s no doubt it has certainly captured the attention of the world’s biggest...
A Parent’s Guide to ChatGPT
ChatGPT is, without doubt, the biggest tech story of the year. It’s created debate in schools and universities, made history...
A New Security Age Needs a New Approach to Security
Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption,...
A New Program for Your Peloton – Whether You Like It or Not
Executive Summary The McAfee Advanced Threat Research team (ATR) is committed to uncovering security issues in both software and hardware to help developers...
A New Android Banking Trojan Masquerades as Utility and Banking Apps in India
Authored by Dexter Shin Over the years, cyber threats targeting Android devices have become more sophisticated and persistent. Recently, McAfee...
A Look Beyond Their Lock Screens: The Mobile Activity of Tweens and Teens
While our tweens and tweens seem to grow into adults right before our eyes, their mobile usage matures into adulthood...
A Look Back: Top 5 Security Trends of 2012
As we look back on 2012, it’s impossible not to recall the many high-profile breaches and cybersecurity incidents that took...
A Look Back at the Equifax Data Breach, One Year Later
WannaCry, Petya, and Equifax first come to mind when you think of the most impactful cyber events in recent years,...
A look ahead to Mobile World Congress 2017
This blog post was written by Nick Viney. It’s nearly that time of year again! Next week, Mobile World Congress...
A Guide to Remove Malware From Your iPhone
Malicious software, or “malware,” refers to any program designed to infect and disrupt computer systems and networks. The risks associated...
A Guide to Identity Theft Statistics for 2023
There’s a digital counterpart for nearly everything we do, which means more of our personal information is online. And although...
A Guide to Finding Out If Your Information Is on the Dark Web
It’s difficult to imagine what life was like before the internet. We log in daily to pay bills, shop, watch...
A Guide for Parents to Help Kids Navigate Social Media Safely
As the back-to-school season approaches, equipping children with the tools and knowledge to navigate social media safely is crucial. In...
A Glance Into the Neutrino Botnet
Lately, we have seen a number of communications through our automated framework from the Neutrino botnet. While analyzing this botnet,...
A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress
More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss...
A Finance Journalist Fell Victim to a $50K Vishing Scam – Are You Also at Risk?
In a world where digital communication dominates, the art of scamming has evolved into a sophisticated game of deception. A...
A Field Trip to McAfee’s World of Cyber
By: Amanda Steger, Senior Director & Sandra Chin, Engineering Operations Manager Educating the next generation of cybersecurity heroes has always...
A Family Technology Contract? Should You or Shouldn’t You?
I would never consider myself to be an A+ parent. Maybe a solid B. Perhaps I can blame the large...
A Dummies Guide to ‘Insider Trading’ via Botnet, Part 2
This post, the second of two parts, was written by Christiaan Beek, Raj Samani, and Shane Shook. In our first post,...
A Dummies Guide to ‘Insider Trading’ via Botnet
This post, the first of two parts, was written by Raj Samani, Christiaan Beek, and Shane Shook. Want to spread...
A Detailed Guide on Cyberbullying
Unfortunately, cyberbullying has become a prevalent and emerging threat in our digital age. Therefore, it's crucial to understand how to help your children navigate and mitigate this pervasive, especially now that they can leave digital footprints anywhere and encounter people with bad intentions.
A Cybersecurity Horror Story: Stay Secure From October’s Creepiest Threats
Halloween time is among us and ghosts and goblins aren’t the only things lurking in the shadows. This past month...
A Cybersecurity Carol: Key Takeaways From This Year’s Most Hackable Holiday Gifts
Now, in its third year, the McAfee Most Hackable Holiday Gifts survey is here again to examine how consumers approach device security around the holidays, and what they need to stay secure while staying in the yuletide sprit. Let’s take a look at what we can learn from McAfee’s Most ...