Featured Blogs
Vulnerability Discovery in Open Source Libraries: Analyzing CVE-2020-11863
Open Source projects are the building blocks of any software development process. As we indicated in our previous blog, as...
Vulnerability Discovery in Open Source Libraries Part 1: Tools of the Trade
Executive Summary Open source has become the foundation for modern software development. Vendors use open source software to stay competitive...
VSkimmer Botnet Targets Credit Card Payment Terminals
April 2 This blog has been updated with McAfee’s NSP detection. See end of blog. While monitoring a Russian underground...
VPNFilter Malware Adds Capabilities to Exploit Endpoints
VPNFilter, a botnet-controlled malware that infects networking devices, was first documented by researchers from Cisco Talos. McAfee Labs also published...
VPNFilter Botnet Targets Networking Devices
VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.
Viva Las Vegas: Cash Out with the #McAfeeAtCES RT2Win Sweepstakes!
We’ve officially touched down in Las Vegas for CES 2020! If you aren’t familiar with CES, it is the global...
Visualizing A DDoS Cyber Attack
A denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated...
Vietnamese ‘Adult’ Apps on Google Play Open Gate to SMS Trojans
Malware related to short message services occupies a large portion of today’s Android malware families. These include premium SMS fraud...
Veterans Day U.S. – A McAfee MoM’s Reflection
By: Deb, Executive Assistant, Plano TX On Monday, November 11, the U.S. celebrates Veterans Day. We at McAfee U.S. are...
Vertexnet Botnet Hides Behind AutoIt
Recently we found some new malware samples using AutoIt to hide themselves. On further analysis we found that those sample...
Verizon Teams Up with McAfee to Secure Today’s Connected Home
Few fields and industries change as rapidly as those in the technology sector. This fast-moving, adaptable and growing sector creates...
Verizon Report Foreshadows Breaches Originating With IoT Devices
This blog post was written by Rick Simon. Today, Verizon released its 2015 Data Breach Investigations Report (DBIR). As Verizon...
Vega Stealer Malware Swoops Financial Data Straight from Chrome and Firefox Browsers
Many internet users today store financial and personal data within a browser so that it auto-populates anytime they encounter a...
VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials
Since the beginning of the year we have seen a spike in ransomware including the emergence of new ransomware families....
Variant of Pony Botnet Pickpockets Bitcoin Users
Last month the Pony Botnet became a household name when it was revealed that it had stolen more than two...
Valentine’s Alert: Don’t Let Scammers Break Your Heart or Your Bank Account
As with any major holiday or special occasion, Valentine’s Day is unfortunately not immune to scammers looking for an opportunity to exploit unsuspecting individuals. In this article, we spotlight some common Valentine’s Day scams, offer tips on how to protect yourself and navigate this romantic day with confidence and caution.
Vacation Checklist: 5 Easy Ways to Help Secure Your Family’s Devices When Traveling
With this writing, we’re joyfully en route to a much-anticipated Florida vacation. A sneak peek into our car — and...
Using the Internet as a Medium For Women To Break The Glass Ceiling
“You know, the internet has done wonders for my business,” said a lady baker to me, beaming at all the...
Using Expert Rules in ENS to Prevent Malicious Exploits
Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention. Learn more about which threats they can help block.
User Data from 23andMe Leaked Online – What Users Should Do, and the Rest of Us Too
In October, a hacker claimed to have hijacked profile information of “millions” of users from the popular genetic testing site...
Use an Airport App to Catch a Flight, Not a Bug
Traveling is supposed to be a break from reality, but that doesn’t mean it’s a breeze. First your Uber driver...
USB Drives – With Convenience Comes Risk
I’m sure most of us have used a USB drive (or thumb drive) at one point or another. They are...
USB Drives – Protecting Your Humble Workhorse from Malware and Loss
The humble USB drive—the workhorse of students, professionals, and everyday computer users. No wonder hackers put USB drives in their...
US-B Careful: Public iPhone Chargers Lie in Wait
It is common knowledge that connecting your devices to public Wi-Fi can expose them to potential malware and other security risks. But have you ever considered the dangers that might be lurking within public USB chargers?
Urgent! Update Your Apple Devices Now
This blog was written by Bruce Snell. A number of serious vulnerabilities have been recently reported impacting OS X, iOS,...
Updates and Mitigation to Microsoft Office Zero-Day Threat (CVE-2013-3906)
On November 5, Microsoft posted Security Advisory 2896666. This vulnerability, discovered by Haifei Li of McAfee Labs, affects multiple versions of Microsoft...
Updated BlackEnergy Trojan Grows More Powerful
In late December, a cyberattack caused a power outage in the Ukraine, plunging hundreds of thousands of citizens into darkness...