Featured Blogs
Behind the CAPTCHA: A Clever Gateway of Malware
Authored by Yashvi Shah and Aayush Tyagi Executive summary McAfee Labs recently observed an infection chain where fake CAPTCHA pages...
Behind the Mobile App: Your Data Exposed
Taylor Swift dropped a musical explosion when she released her music video for the song “Bad Blood” earlier this year....
Beneath the Surface: How Hackers Turn NetSupport Against Users
NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we delve...
BeReal – The Newest Kid On The Social Media Block
Without doubt, the biggest criticism we all have of social media is that everyone always looks fabulous! And while we...
Best Practices for Adapting to a Remote Work Lifestyle
As our world continues to evolve, we have been forced to adapt accordingly. Navigating change can be difficult for many, so...
Best practices for preventing Dridex infections
Mitigating the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of...
Best Smart Home Devices for a Connected New Year
Like many of you, I spent a lot of time at home this year, but it came with an unexpected...
Best Ways to Check for a Trojan on Your PC
The internet has changed our lives in more ways than we can count. These days, anything we desire — whether...
Beware Cloned Facebook Profiles
If you have had a Facebook friend request from a friend that you are sure you already have then –...
Beware of Back-To-School Scams
These days it seems that there is a scam for every season, and back-to-school is no different. From phony financial...
Beware of BRATA: How to Avoid Android Malware Attack
Cybercriminals go to great lengths to hack personal devices to gather sensitive information about online users. To be more effective, they make significant investments in their technology. Also, cybercriminals are...
Beware of Impostor Android Apps Using Fake ID
Recently discovered, an Android vulnerability called Fake ID allows apps to impersonate other apps by copying their identity. Each app...
Beware of Malicious Mobile Apps
With the surge in the usage of mobile phones, there has been a concurrent increase in malicious activities targeting these devices. One common technique used by hackers is to corrupt legitimate applications. Android devices, in particular, see increases in malware targeting mobile phones year by year.
Beware of Social Media Scams
Social media is a great place to connect with friends and family. Unfortunately, it is also a great place for...
Beware of the Risks of Online Gaming and Fantasy Football
August may mean the last days of summer vacation and start of back to school for some, but for die...
Beware of These Voting Scams Happening Now
With the election quickly approaching, it’s essential to be informed and cautious about the growing number of voting scams. Scammers...
Beware the Rapid Proliferation of Cyber-warfare Capabilities
Governments across the globe continue to invest in cyber warfare operations. Over 60 countries, a number that is rising, currently...
Beware: Zombie IoT Botnets
The ghosts and ghouls of October have come and gone, but the dangers lurking behind virtual walls have hardly disappeared....
Beyond Clubhouse: Vulnerable Agora SDKs Still in Widespread Use
On February 17th, 2021, McAfee disclosed findings based on a 10-month long disclosure process with major video conferencing vendor Agora,...
Big, Hard-to-Solve Problems
Improving the Lifecycle of Threat Defense Effectiveness When a new security tool or technique is released, Version 1.0 is usually...
Bing.VC Hijacks Browsers Using Legitimate Applications
Browser hijackers are a type of malware that modifies a web browser’s settings without the user’s permission. Generally a browser hijacker...
Bitcoin Headlines Attract Malware Developers
Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate. In the second quarter of...
Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code
Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware...
Bitcoin Security: Mining Threats You Need to Know
Bitcoin security risks are a cryptocurrency reality. Learn more about bitcoin mining safety and how to protect your devices.
Black Friday and Cyber Monday Scams: Beware of the Pitfalls
With the shopping bonanzas of Black Friday and Cyber Monday comes a flurry of deals and offers, some of which are too good to be true. Unfortunately, the latter instances often become scams run by fraudsters seeking to take advantage of the shopping frenzy.
Black Friday and Holiday Shopping Dangers
This blog was written by Bruce Snell. As a kid, I remember hearing about the horror stories of the insanity...
Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own
Director Michael Mann’s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity...