Featured Blogs
CVE-2016-0018: DLL Planting Leads to a Remote Code Execution Vulnerability
DLL planting, also known as DLL side loading, is a popular attack technique today. If we take a look at...
CVE-2016-0153: Microsoft Patches Possible OLE Typo
Recently McAfee Labs discovered an interesting bug in Windows’ OLE implementation, which Microsoft patched this week. Now that the patch...
CVE-2020-16898: “Bad Neighbor”
CVE-2020-16898: “Bad Neighbor” CVSS Score: 8.8 Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C Overview Today, Microsoft announced a critical vulnerability in the Windows IPv6 stack,...
CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server
CVSS Score: 9.8 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Overview Microsoft released a patch today for a critical vulnerability (CVE-2020-17051) in the Windows NFSv3 (Network File System) server. NFS is typically...
Cyber Criminals Gain in Sophistication With Integrity Attacks
One constant in cybersecurity is the continual rise of sophistication and creativity of attackers. In 2016, we will see a...
Cyber Insurance – The Need of the Hour
Years ago, when we were complete newbies to computers, data loss was a frequent occurrence. Files were lost as they...
Cyber Monday: Protect Yourself and Your Family from Online Shopping Scams
The eagerly awaited holiday sales such as Black Friday and Cyber Monday are just around the corner. These tips will help you avoid falling prey to online scams, thereby ensuring that you keep your finances safe during this shopping season.
Cyber Parenting – Let’s Hear What Mothers Have to Say
Children’s Day is around the corner and it has me thinking. With all the brouhaha over a connected future and...
Cyber Pranks – Funny or Mean??
We all know that kids love to play pranks – it is just part of childhood. Whether it is whoopee...
Cyber Threat Alliance Releases Analysis of Illicit Cryptocurrency Mining
In response to the explosive increase in cryptomining campaigns in Q4 2017, the Cyber Threat Alliance has formed a cryptomining subcommittee to assess the threat.
Cyberbullying: Words do Hurt When it Comes to Social Media
Most parents may find it difficult to relate to today’s form of cyberbullying. That’s because, for many of us, bullying...
Cyberbullying’s Impact on Both Society and Security
More than half of children say that a cyberbully targeted them online. That disquieting stat comes from our recent global...
Cybercasing – How Sharing Your Pics, Videos and Status Updates Can Get You Into Trouble
It can be fun ‘checking in’ at your favourite restaurant on Facebook, sharing pics of your hotel room on Instagram...
Cybercrime ‘Highlights’ of First Quarter 2014
As a supplement to the next McAfee Labs Threats Report, which will appear next month, we offer this timeline of...
Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events
Every four years, everyone’s head around the globe turns toward the television. The Olympics, the World Cup – world events like...
Cybercrime’s Most Wanted: Four Mobile Threats that Might Surprise You
It’s hard to imagine a world without cellphones. Whether it be a smartphone or a flip phone, these devices have...
Cybercriminal Speaks With Child via Hacked Smart Camera: How You Can Stay Protected
IoT devices enter our homes out of ease and convenience, as the gadgets often optimize or streamline ordinary tasks —...
Cybercriminals Actively Exploiting RDP to Target Remote Organizations
The COVID-19 pandemic has prompted many companies to enable their employees to work remotely and, in a large number of...
Cybercriminals Breach Yahoo, Impacting 500 Million Users
When it comes to data breaches there are hits and there are misses. And then there are hits. Today, there...
Cybercriminals Claim They Have ‘Millions’ of iCloud Credentials, but Likelihood Is Low.
A lot of people love to play poker for the thrill and entertainment of sheer luck. For some, however, it’s...
Cybercriminals Crack into 360 Million Old Myspace Accounts
It’s easy to create online accounts, and it’s just as easy to forget them. Remember Myspace? The early social media...
Cybercriminals Disguised as Apple Are After Users’ Personal Data
With the holidays rapidly approaching, many consumers are receiving order confirmation emails updating them on their online purchases for friends...
Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks
In the late 90s and early 2000s, most web browsers came with small, add-on programs to enhance browsing. Most of...
Cybercriminals Test Malware Through a Comment on Britney Spears’ Instagram Page
Oops, Trojan malware did it again. This time, it’s targeting popstar Britney Spears’ social media, specifically, her Instagram page. However,...
Cybercrooks are SMiShing for your Apple Credentials
This blog was written by Bruce Snell. SMiShing is another one of those fantastic terms on the internet that drives...
Cybersecurity 101: Top Takeaways from Our Back to School Study
The end of summer is almost here, which means both parents and their kids are starting to gear up for...
Cybersecurity Awareness Month Helps Us All be #BeCyberSmart
Cybersecurity Awareness Month Helps Us All be #BeCyberSmart October is Cybersecurity Awareness Month, which is led by the National Cyber...