Featured Blogs
Veterans Day U.S. – A McAfee MoM’s Reflection
By: Deb, Executive Assistant, Plano TX On Monday, November 11, the U.S. celebrates Veterans Day. We at McAfee U.S. are...
VPNFilter Botnet Targets Networking Devices
VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.
VPNFilter Malware Adds Capabilities to Exploit Endpoints
VPNFilter, a botnet-controlled malware that infects networking devices, was first documented by researchers from Cisco Talos. McAfee Labs also published...
VSkimmer Botnet Targets Credit Card Payment Terminals
April 2 This blog has been updated with McAfee’s NSP detection. See end of blog. While monitoring a Russian underground...
Vulnerability Discovery in Open Source Libraries Part 1: Tools of the Trade
Executive Summary Open source has become the foundation for modern software development. Vendors use open source software to stay competitive...
Vulnerability Discovery in Open Source Libraries: Analyzing CVE-2020-11863
Open Source projects are the building blocks of any software development process. As we indicated in our previous blog, as...
Vulnerable OpenSSL Handshake Renegotiation Can Trigger Denial of Service
OpenSSL, the popular general-purpose cryptographic library that implements SSL/TLS protocols for web authentication, has recently suffered from several vulnerabilities. We...
W97M Downloader Serves Vawtrak Malware
McAfee Labs recently found a variant of the W97M macro malware downloader that runs the Vawtrak malware. Although W97M usually...
Want to Break Into a Locked Windows 10 Device? Ask Cortana (CVE-2018-8140)
June’s “Patch Tuesday” (June 12) is here, but it is likely many Windows 10 users have not yet applied these updates.
We Be Jammin’ – Bypassing Chamberlain myQ Garage Doors
The convenience that many IOT devices provide often persuades consumers away from thinking about possible security concerns. McAfee Advanced Threat Research recently investigated Chamberlain’s MyQ Hub, a “Universal” garage door automation platform.
Weaponized Medical Data as Damaging as Clinton’s Emails or Trump’s Videos
The 2016 presidential election in the United States will be remembered for a great many things. Never before in US...
WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies.
We’ve Been Hacked! Okay, I’ll Deal With It Next Week
That was the message I got from a CEO when we presented evidence that their organization had been compromised and...
What CVE-2020-0601 Teaches Us About Microsoft’s TLS Certificate Verification Process
By: Jan Schnellbächer and Martin Stecher, McAfee Germany GmbH This week security researches around the world were very busy working...
What Drives a Ransomware Criminal? CoinVault Developers Convicted
How often do we get a chance to learn what goes on in the minds of cybercriminals? Two members of...
What is a McAfee Internship Like? 10 Interns Share Perspectives
At McAfee, we foster meaningful internship experiences within our fast-paced world of cybersecurity. We know it’s the next generation that will build tomorrow’s technology solutions. McAfee interns make substantial contributions and are valued as global team members, joining our...
What Is Mshta, How Can It Be Used and How to Protect Against It
The not-so Usual Suspects There is a growing trend for attackers to more heavily utilize tools that already exist on...
What I’m Thankful for This Year: Combining Passion & Career
By Philip, Program Manager, People First Office Back in April, I started my new role at McAfee as the Program...
What’s in the Box?
2018 was another record-setting year in the continuing trend for consumer online shopping. With an increase in technology and efficiency,...
What’s in the Box? Part II: Hacking the iParcelBox
Package delivery is just one of those things we take for granted these days. This is especially true in the...
When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign
Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets. The following...
When the Digital Impacts the Physical
Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices…until they...
Which Cybersecurity Data Should You Trust?
Limitations of security data We are constantly battered by cybersecurity data, reports, and marketing collateral—and we shouldn’t treat all of this...
Why Am I Getting All These Notifications on my Phone?
Learn more about the Chrome notifications on Android mobile devices such as phones and tablets, and how McAfee Mobile Security protects users from malicious sites leveraging these notifications.
Why Does My Car Have Its Own Smartphone?
You would be surprised at the number of places you can find a GSM SIM card. Outside of your mobile phone,...
Why I Bring My Authentic Self to Work at McAfee
By Kristol, Sales Account Manager and President, McAfee African Heritage Community If you talked to me when I first started...
Why I’m Proud to Protect
At McAfee, we’re proud to protect. It’s part of our DNA. We’re all dedicated to keeping the world safe from...