Featured Blogs
15 Tips To Better Password Security
Protect your information by creating a secure password that makes sense to you, but not to others. Most people don’t...
Apps to Stop You (Adults!) from Texting and Driving
She was texting and driving when she hit my kid. No, it wasn’t a careless teenager or a group of...
New Exploit of Sandworm Zero-Day Could Bypass Official Patch
Update of October 25: Some comments posted after we published this report suggest that our proof-of-concept exploit will trigger the...
Cerber Ransomware Updates Configuration File
This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the...
So You Think Your Phone Is Hacked—Here’s What to Do
Humans are private by nature. We may share an inspiring article or photos from a fun trip, but we keep...
Further Analysis of WannaCry Ransomware
McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its...
Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack
This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...
Netflix Users: Don’t Get Hooked by This Tricky Phishing Email
If you own a smart TV, or even just a computer, it’s likely you have a Netflix account. The streaming...
Cybercriminal Speaks With Child via Hacked Smart Camera: How You Can Stay Protected
IoT devices enter our homes out of ease and convenience, as the gadgets often optimize or streamline ordinary tasks —...
Remote iPhone Jailbreak Using PDF Exploit Should Serve as Wake-Up Call
Like many iPhone users, I “jailbreak” my iPhone. I do this for many reasons, but mainly for console-level access and...
Are Your Kids Using Vault Apps to Hide Photos, Chats, or Videos?
A number of apps for both the Android and iPhone exist that are great for storing your personal “gems,” those...
Obad.a – What You Need to Know About the Latest Android Threat
With the convenience of our mobile apps, we increasingly rely on our phones for work and play. But did you...
Product Coverage and Mitigation for CVE-2014-1761 (Microsoft Word)
On March 24, Microsoft released Security Advisory 2953095 for Microsoft Word. In-the-wild exploitation of this vulnerability has been observed across...
Product Coverage and Mitigation for CVE-2014-1776 (Microsoft Internet Explorer)
On April 26, Microsoft released Security Advisory 2963983 for Microsoft Internet Explorer. In-the-wild exploitation of this vulnerability has been observed...
How to Spot and Protect Yourself from Fake Antivirus Software
Most of you know how important it is to have security software on your computers to stay protected from viruses, malware,...
Teen Hashtags: What Every Parent Ought to Know
Hashtags have become a normal part of everyday vernacular thanks to social media. By simply putting a pound (#) sign...
Beware of Impostor Android Apps Using Fake ID
Recently discovered, an Android vulnerability called Fake ID allows apps to impersonate other apps by copying their identity. Each app...
At McAfee, Protecting Customers Takes Precedence Over Seeking Headlines
One question I often hear is “When will McAfee publish a report on the latest threat?” It seems to be...
How to Report an Online Scam
For many online consumers, money (or the power of it) hovers quietly and invisibly over an online shopping cart only...
Malware Mystery: JS/Nemucod Downloads Legitimate Installer
JS/Nemucod is the detection name given to a family of malicious JavaScript downloaders that have appeared in spam campaigns since last year....
Microsoft’s June Patch Kills Potential CFG Bypass
After applying Microsoft’s June patch, we noticed some interesting changes that prevent a security bypass of Windows’ Control Flow Guard...
No More Ransom: A New Initiative to Battle Ransomware
This blog was written by Bruce Snell. Ransomware has seen a huge increase over the past couple of years. According...
Everyday Hero: 5 Questions with McAfee Labs’ Paula Greve
iWith cybersecurity experts taking center stage this week at the Black Hat conference in Las Vegas, the world is watching...
5 Tips for Avoiding Android Malware
The ubiquity of mobile phones has created a unique opportunity for cybercriminals. They now have a way of accessing both...
McAfee AMSI Integration Protects Against Malicious Scripts
This blog describes how the AMSI (Antimalware Scan Interface) is used within the various McAfee products, and highlights some of the malware we are able to detect with it.
What Is the CurveBall Bug? Here’s What You Need to Know
Today, it was announced that researchers published proof of concept code (essentially, an exercise to determine if an idea is a reality) that exploits a recently patched vulnerability in...
Why Taking Your Teen’s Phone Away Doesn’t Work Anymore
If you are the parent of a tween or teen, you know the challenge of setting and following through with consequences. If you are like many parents, your first instinct is to restrict the thing they love the most, which is communication with their peers and the dependence they have ...