Featured Blogs
Agent Tesla’s Unique Approach: VBS and Steganography for Delivery and Intrusion
Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the...
AI & Your Family: The Wows and Potential Risks
From cell phones with built-in smart assistants to home assistants that carry out voice commands, from social networks that determine what content we see to music apps that curate playlists based on our preferences, AI has its footprints everywhere. Therefore, it’s integral to not only embrace the wows of this ...
AI chatbots are becoming romance scammers—and 1 in 3 people admit they could fall for one
It started with a DM. For five months, 25-year-old computer programmer Maggie K. exchanged daily messages with the man she...
AI Enters the Mix as Online Job Scams Continue to Rise
You didn’t get the job. Worse yet, you got scammed. Because the opening was never real in the first place....
AI in the Wild: Malicious Applications of Mainstream AI Tools
It’s not all funny limericks, bizarre portraits, and hilarious viral skits. ChatGPT, Bard, DALL-E, Craiyon, Voice.ai, and a whole host...
All Work and No Play? Not at McAfee!
By Srinidhi, Software Quality Engineer There’s more to life than work. It’s a commonly held and often stated view, but companies...
All-New Ransomware Coverage Opens Up the Path to Recovery
Our all-new ransomware coverage is now available, ready to help just in case—all backed by expert advice to help you...
Alleged ‘Momo Challenge’ Reminds Parents to Monitor Online Content
Editor’s Note: This blog post includes disturbing content and mentions of suicide. Internet challenges have been going on for years....
Almost 5% of Smartphones Lost Every Year
McAfee and Ponemon Institute recently released “The Lost Smartphone Problem,” a study that attempts to determine how many employees’ smartphones...
Amazon Gift Card Malware Spreading via SMS
McAfee Labs recently published its Hacking the Human OS report, which details a number of ways in which cybercriminals rely...
America’s Dirty Little Secrets: Opening the Door to Protected Data
It’s 2018. Digital assistants have started taking over our homes, with adoption growing tenfold. These smart speakers know everything about...
An Aware Child is Safer Online
A Parent’s Handy Primer on Cyber Vocabulary – Part II Welcome back to our primer! As you may recall, our...
An Aware Child is Safer Online
A Parent’s Handy Primer on Cyber Vocabulary – Part IV Aaaaaand, we are back! *drum rolls* This week’s topic is...
An Inkjet Printer is All You Need to Hack a Smartphone’s Fingerprint Scanner
No two fingerprints are alike. It’s an undisputable fact that’s allowed humanity to make huge strides in criminal justice, record-keeping,...
An Inside Look into Microsoft Rich Text Format and OLE Exploits
There has been a dramatic shift in the platforms targeted by attackers over the past few years. Up until 2016,...
An Overall Philosophy on the Use of Critical Threat Intelligence
The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and...
An Overview of Malware Self-Defense and Protection
Many malware authors spend a great deal of time and effort to develop complex code. Their success depends on a...
An Overview of Messaging Botnets
In the quarterly McAfee Threats Reports we offer our readers some charts on the prevalence of messaging botnets. For the...
Analysis of a Chrome Zero Day: CVE-2019-5786
1. Introduction On March 1st, Google published an advisory [1] for a use-after-free in the Chrome implementation of the FileReader...
Analysis of Chrysaor Keylogging Mechanism Shows Power of Simple Malicious Code
Many attacks on mobile devices use social engineering to initially infect a victim’s system. They download malware and elevate privileges...
Analysis of LooCipher, a New Ransomware Family Observed This Year
Co-authored by Marc RiveroLopez. Initial Discovery This year seems to again be the year for ransomware. Notorious attacks were made...
Analyzing a Fresh Variant of the Dorkbot Botnet
This blog post was written by Sudhanshu Dubey. At McAfee Labs, we have recently observed a new variant of the...
Analyzing a Patch of a Virtual Machine Escape on VMware
This blog was written by Yakun Zhang. A virtual machine is a completely isolated guest operating system installation within a...
Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423
Introduction As of July 2019, Microsoft has fixed around 43 bugs in the Jet Database Engine. McAfee has reported a...
Analyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service
The network time protocol synchronizes time across various devices on a network. The network time protocol daemon (NTPD) is an...
Analyzing CVE-2017-0190: WMF Flaws Can Lead to Data Theft, Code Execution
CVE-2017-0190 is a recently patched vulnerability related to Windows metafiles (WMFs), a portable image format mainly used by 16-bit Windows...
Analyzing CVE-2017-3731: Truncated Packets Can Cause Denial of Service in OpenSSL
OpenSSL is a popular open-source library for SSL and is used by various software and companies across the world. In...