Featured Blogs
Andromeda Botnet Hides Behind AutoIt
Last month, I posted a blog about an increase in the use of AutoIt scripts by malware authors to carry...
Announcing McAfee’s Evolved Consumer Product Portfolio
Every fall the leaves change colors, sweaters replace sundresses, and new changes are afoot. Especially for us at McAfee. In...
Anonymous App ‘After School’ Gaining Popularity with Teens
I’ve advised my kids since they were babies: If you need to hide it, you probably shouldn’t be doing it....
Another Day, Another PoS Hack. What Makes the Micros Incident Different?
Motivated by money, cybercriminals are always chasing where it goes. That greed has now led them to where transactions are...
Another Day, Another Smart Toy Hack: This Time, It’s Fisher-Price
Toys offer a unique insight into a time, place and culture that has come and gone. While the Romans had...
Anyone Can Try ChatGPT for Free—Don’t Fall for Sketchy Apps That Charge You
Anyone can try ChatGPT for free. Yet that hasn’t stopped scammers from trying to cash in on it. A rash...
Apache Struts at REST: Analyzing Remote Code Execution Vulnerability CVE-2017-9805
Apache Struts, an open-source web development framework, is prone to vulnerabilities. We wrote about CVE-2017-9791 in July. The latest is...
App Alert: What Parents Need to Know about Popular New App ‘Yellow’
Go pick up your child’s phone. Is there an app icon that is a solid, yellow square? While that little...
App Inventor Enables the Easy Creation of Malicious Apps
In today’s increasingly connected society, heaps of new mobile apps are cropping up every day. It no longer takes a...
App Lock: The Security System for Unprotected Mobile Apps
Lock: To fasten, to make secure, to confine or exclude by. To fix in place so that movement or escape...
App Store Flooded with Phony Retail Apps to Kick Off Holiday Season
The holiday season has officially kicked off, which means a number of things for many of us: seasonal cheer, quality...
Appearances Can Be Deceiving: Fake Anti-Virus App Dupes Users
If the laws of nature are capable of teaching us one thing it’s this: if it seems too good to...
Apple iOS Attack Underscores Importance of Threat Research
The recent discovery of exploit chains targeting Apple iOS is the latest example of how cybercriminals can successfully operate malicious campaigns, undetected,...
Apple Users: Here’s What to Do About the Major FaceTime Bug
FaceTime is a popular way for people of all ages to connect with long-distance loved ones. The feature permits Apple...
Apple Users: This macOS Malware Could Be Spying on You
In 2018, Macs accounted for 10% of all active personal computers. Since then, popularity has skyrocketed. In the first quarter of 2021, Macs experienced 115% growth...
Apple, SSL, and the Importance of Updating Your Software
Before we begin: please take a minute to update all of your iOS devices to the latest iOS version, iOS...
Apply MITRE’s ‘ATT&CK’ Model to Check Your Defenses
Every week we read about adversaries attacking their targets as part of online criminal campaigns. Information gathering, strategic advantage, and...
Apps Sending Plain HTTP Put Personal Data at Risk
At the AVAR Conference in November 2014, McAfee Labs presented how to exploit a cross-site scripting vulnerability of the Costco...