Featured Blogs
Was the Fake Joe Biden Robocall Created with AI?
As voters in the recent New Hampshire primary have found, a fake robocall of President Joe Biden has been making...
Was My TikTok Hacked? How to Get Back Into Your Account and Lock Down Sessions
It usually starts with a small, uneasy moment. A notification you don’t recognize. A login code you didn’t request. A friend texting to ask...
Warning: Lokibot Is Looking to Access Your Android
This time of year is always busy for me. Between pre-holiday online shopping, and the push to connect with friends...
Warning: Crypto-Currency Mining is Targeting Your Android
Cryptocurrency, a virtual form of currency designed to work as a secure form of exchange, has gained a lot of...
Want Your Kids to Care More About Online Safety? Try These 7 Tips
The topics parents need to discuss with kids today can be tough compared to even a few years ago. The...
Want to Break Into a Locked Windows 10 Device? Ask Cortana (CVE-2018-8140)
June’s “Patch Tuesday” (June 12) is here, but it is likely many Windows 10 users have not yet applied these updates.
W97M Downloader Serves Vawtrak Malware
McAfee Labs recently found a variant of the W97M macro malware downloader that runs the Vawtrak malware. Although W97M usually...
W-2s Are Arriving. Here’s How to Spot and Avoid Tax Scams
W-2 phishing scams often involve emails that appear to be from the IRS or another official source, requesting personal information. The goal is to trick the recipient into revealing confidential data, such as social security numbers and financial information, which the perpetrator can then use for fraudulent purposes.
Vulnerable OpenSSL Handshake Renegotiation Can Trigger Denial of Service
OpenSSL, the popular general-purpose cryptographic library that implements SSL/TLS protocols for web authentication, has recently suffered from several vulnerabilities. We...
Vulnerability Discovery in Open Source Libraries: Analyzing CVE-2020-11863
Open Source projects are the building blocks of any software development process. As we indicated in our previous blog, as...
Vulnerability Discovery in Open Source Libraries Part 1: Tools of the Trade
Executive Summary Open source has become the foundation for modern software development. Vendors use open source software to stay competitive...
VSkimmer Botnet Targets Credit Card Payment Terminals
April 2 This blog has been updated with McAfee’s NSP detection. See end of blog. While monitoring a Russian underground...
VPNFilter Malware Adds Capabilities to Exploit Endpoints
VPNFilter, a botnet-controlled malware that infects networking devices, was first documented by researchers from Cisco Talos. McAfee Labs also published...
VPNFilter Botnet Targets Networking Devices
VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.
Viva Las Vegas: Cash Out with the #McAfeeAtCES RT2Win Sweepstakes!
We’ve officially touched down in Las Vegas for CES 2020! If you aren’t familiar with CES, it is the global...
Visualizing A DDoS Cyber Attack
A denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated...
Vietnamese ‘Adult’ Apps on Google Play Open Gate to SMS Trojans
Malware related to short message services occupies a large portion of today’s Android malware families. These include premium SMS fraud...
Veterans Day U.S. – A McAfee MoM’s Reflection
By: Deb, Executive Assistant, Plano TX On Monday, November 11, the U.S. celebrates Veterans Day. We at McAfee U.S. are...
Vertexnet Botnet Hides Behind AutoIt
Recently we found some new malware samples using AutoIt to hide themselves. On further analysis we found that those sample...
Verizon Teams Up with McAfee to Secure Today’s Connected Home
Few fields and industries change as rapidly as those in the technology sector. This fast-moving, adaptable and growing sector creates...
Verizon Report Foreshadows Breaches Originating With IoT Devices
This blog post was written by Rick Simon. Today, Verizon released its 2015 Data Breach Investigations Report (DBIR). As Verizon...
Verify Secure Wireless Networks to Prevent Identity Theft
Wireless internet is amazing and convenient. Sadly, unsecured, unprotected wireless is everywhere. When a device connects to unprotected Wi-Fi, all the data stored on that device is available to a hacker with the proper sniffing tools. It is, however, possible to protect your Wi-Fi from being hacked.
Venmo 101: Making Safer Payments with the App
As the holiday season ramps up, so do group dinners, shared travel costs, gift exchanges, and all the little moments...
Vega Stealer Malware Swoops Financial Data Straight from Chrome and Firefox Browsers
Many internet users today store financial and personal data within a browser so that it auto-populates anytime they encounter a...
VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials
Since the beginning of the year we have seen a spike in ransomware including the emergence of new ransomware families....
Variant of Pony Botnet Pickpockets Bitcoin Users
Last month the Pony Botnet became a household name when it was revealed that it had stolen more than two...
Vampire Wifi: How Public Wi-Fi Traps Travelers in Cyber Attacks
They’re not hiding in dark alleys—they’re hiding in plain sight. Airports, cafés, hotels, even libraries can harbor dangerous Vampire Wi-Fi...
