Featured Blogs
Has Your Phone Become Your Third Child? Ways to Get Screen Time Anxiety Under Control
You aren’t going to like this post. However, you will, hopefully, find yourself nodding and perhaps, even making some changes...
Hardware Hack Bypasses iPhone PIN Security Counter
A security researcher from the University of Cambridge has found a way to hack the iPhone NAND memory hardware to...
Happy New Year 2019! Anatova is here!
During our continuous hunt for new threats, we discovered a new ransomware family we call Anatova (based on the name...
Hang Up on Hackers: Protect Yourself from Mobile App Video Conferencing Vulnerabilities
Hang Up on Hackers: Protect Yourself from Mobile App Video Conferencing Vulnerabilities Whether they’re attending regular work meetings or catching...
Handling Social Media Stress for Teens
Our society is undeniably superbly interconnected, and our digital persona is greatly treasured. However, this isn't always beneficial, especially for teenagers who may be overwhelmed by the deluge of information, leading to stress.
Hancitor Making Use of Cookies to Prevent URL Scraping
This blog was written by Vallabh Chole & Oliver Devane Over the years, the cybersecurity industry has seen many threats...
HANCITOR DOC drops via CLIPBOARD
By Sriram P & Lakshya Mathur Hancitor, a loader that provides Malware as a Service, has been observed distributing malware such as...
Hallucinating Headlines: The AI-Powered Rise of Fake News
The number of AI-powered fake news sites has now surpassed the number of real local newspaper sites in the U.S....
Hacktivists Turn to Phishing to Fund Their Causes
At McAfee we recently observed a phishing campaign targeting Apple account holders. The link directed the user to a compromised WordPress...