Featured Blogs
Make Your Smart Home a Secure Home Too: Securing Your IoT Smart Home Devices
It’s only a smart lightbulb. Why would anyone want to hack that? Great question. Because it gets to the heart...
Make a Hacker’s Job Harder with Two-step Verification
Using identical passwords is convenient for us as users, but it’s also convenient for any hacker trying to steal personal information—once a hacker has access to one of your accounts, he can use a recycled password to snoop around at will.
Major Websites Twitter, Spotify, Netflix Shut Down by DDoS Attack
We’re no strangers to Armageddon-scenario movies, but today a real disaster hit the internet. Using brute-force tactics that flood key...
Major International Airport’s Security System Found for Sale on Dark Web RDP Shop
The closest many of us get to the dark web is watching hackers surf it in television shows or movies....
Major HTTP Vulnerability in Windows Could Lead to Wormable Exploit
Today, Microsoft released a highly critical vulnerability (CVE-2021-31166) in its web server http.sys. This product is a Windows-only HTTP server...
Macro Malware Targets Macs
Macro malware has been spreading for years. New techniques arise all the time to hide malicious code and thus increase...
Macro Malware Employs Advanced Sandbox-Evasion Techniques
During the past couple of weeks, McAfee Labs has observed a new variant of macro malware. With this variant when...
Macro Malware Employs Advanced Obfuscation to Avoid Detection
Attacks by macro malware carrying ransomware are growing, as we have recently reported on Blog Central here and here. Now McAfee Labs...
Macro Malware Associated With Dridex Finds New Ways to Hide
Macro malware is on the upswing and cybercriminals are always searching for new ways to deceive users and evade detection....
