Featured Blogs
Update: NGRBot Posing as Skype Drops Ransomware With Fake McAfee Logo
This blog was updated on October 15. See the end of this file. We recently received a sample of the...
Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets
Charles Strite, according to Lemelson-MIT, first introduced the modern toaster in 1926. It was, and remains to this day, a...
Update on the Beebone Botnet Takedown
On April 8, the takedown operation for the polymorphic botnet known as Beebone successfully concluded. This action redirected traffic from...
Unwrapping Some of the Holiday Season’s Biggest Scams
Even with the holidays in full swing, scammers won’t let up. In fact, it’s high time for some of their...
Unwanted Guests at Trump Hotels: Malware and Credit Card Fraud
Hotels go to great lengths to be your home away from home. Therefore, the last thing they, and you, want...
Unsubscribing From Unwanted Email Carries Risks
We all receive loads of unwanted email solicitations, warnings, and advertisements. The number can be overwhelming to the point...
Unsecured IoT Devices Behind Last Week’s DDoS Attack, More Likely to Come
A hyper-connected world offers a lot of benefits, but it also comes with a lot of risk. President Obama has...
Unregulated at Any Speed: DoT’s Cybersecurity Policy for Self-Driving Cars
Despite headlines, hype, and hysteria, US government rightly chooses cybersecurity guidance over regulation. The Obama administration today unveiled its long-awaited...
Unplugging: How Small Tech Shifts Can Make a Big Impact on a Family Vacation
The smartphone is the one item that automatically ignites an inner struggle as we pack for that long-awaited family vacation....
Unmasking AsyncRAT New Infection Chain
Authored by Lakshya Mathur & Vignesh Dhatchanamoorthy AsyncRAT, short for “Asynchronous Remote Access Trojan,” is a sophisticated piece of malware...
Unmasking AI and the Future of Us: Five Takeaways from the Oprah TV Special
In a recent special hosted by Oprah Winfrey titled “AI and the Future of Us”, some of the biggest names...
Unintended Clipboard Paste Function in Windows 10 Leads to Information Leak in RS1
The McAfee Labs Advanced Threat Research team has been investigating the Windows 10 platform. We have submitted several vulnerabilities already...
Unfolding the Mystery of Cerber Ransomware’s Random File Extension
This blog post was written by Sudhanshu Dubey. In an earlier blog, we discussed the evolution of the popular Cerber...
Understanding Your Kid’s Smart Gadgets
When people think about IoT devices, many often think of those that fill their homes. Smart lights, ovens, TVs, etc....
Understanding the Risks of Using an Android Device
Android has, over time, become a popular target for hackers. Recently, McAfee Labs™ found that all new forms of malicious mobile software were solely designed to exploit vulnerabilities in the Android operating system.
Understanding Online Trolls and How to Deal with Them
Imagine, if you will, a person who goes online each day with the sole mission of triggering confrontation, provoking conflict,...
Uber Data Breach and How to Protect Your Info
The Latest on the Uber Data Breach and Protecting Your Info You may have spotted the news last week that...
U.S. Election 2020 – Don’t Let COVID-19 Misinformation Suppress Your Vote
U.S. Election 2020 – Don’t Let COVID-19 Misinformation Suppress Your Vote In the early days of the COVID-19 pandemic, another...
U.S. Battleground County Website Security Survey
Today McAfee released the results of a survey of county websites and county election administration websites in the 13 states...
Typosquatting Attacks Alive and Well–Unfortunately
Typosquatting doesn’t get the attention that it used to, but it remains an effective means for attackers to capitalize on unsuspecting...
Types of Online Banking Scams and How to Avoid Them
Online banking puts the ability to pay bills, check your balance, or transfer money at your fingertips. Unfortunately, it can...
Two-Factor vs. Multi-Factor Authentication: What’s the Difference?
This article breaks down the forms of authentication, explaining how they work and how they can enhance online information security.
Two Pink Lines
Depending on your life experiences, the phrase (or country song by Eric Church) “two pink lines” may bring up a...
Two Attacks On Mobile Banking Are Back
It feels as through every day, a new app is released that makes it easier to pay for something through...
Twitter Drama and What Parents Need to Know
With more teens flocking to social networks outside of Facebook, it’s more important than ever for parents to understand—and coach...
Twitter Accounts of US Media Under Attack by Large Campaign
A previously reported campaign purportedly carried out by Turkish hacker group “Ayyildiz Tim” targeting high-profile, verified Twitter accounts with the purpose of spreading Turkish political propaganda appears to have escalated within the last 24 hours. McAfee Advanced Threat Research has investigated the new events and discovered the following.
Turkish Instagram Password Stealers Found on Google Play
McAfee’s mobile malware research team has found several Instagram password stealers on the Google Play store. (Google has since removed...