Featured Blogs
Remote iPhone Jailbreak Using PDF Exploit Should Serve as Wake-Up Call
Like many iPhone users, I “jailbreak” my iPhone. I do this for many reasons, but mainly for console-level access and...
Are Your Kids Using Vault Apps to Hide Photos, Chats, or Videos?
A number of apps for both the Android and iPhone exist that are great for storing your personal “gems,” those...
Obad.a – What You Need to Know About the Latest Android Threat
With the convenience of our mobile apps, we increasingly rely on our phones for work and play. But did you...
Product Coverage and Mitigation for CVE-2014-1761 (Microsoft Word)
On March 24, Microsoft released Security Advisory 2953095 for Microsoft Word. In-the-wild exploitation of this vulnerability has been observed across...
Product Coverage and Mitigation for CVE-2014-1776 (Microsoft Internet Explorer)
On April 26, Microsoft released Security Advisory 2963983 for Microsoft Internet Explorer. In-the-wild exploitation of this vulnerability has been observed...
How to Spot and Protect Yourself from Fake Antivirus Software
Most of you know how important it is to have security software on your computers to stay protected from viruses, malware,...
Teen Hashtags: What Every Parent Ought to Know
Hashtags have become a normal part of everyday vernacular thanks to social media. By simply putting a pound (#) sign...
Beware of Impostor Android Apps Using Fake ID
Recently discovered, an Android vulnerability called Fake ID allows apps to impersonate other apps by copying their identity. Each app...
At McAfee, Protecting Customers Takes Precedence Over Seeking Headlines
One question I often hear is “When will McAfee publish a report on the latest threat?” It seems to be...
How to Report an Online Scam
For many online consumers, money (or the power of it) hovers quietly and invisibly over an online shopping cart only...
Malware Mystery: JS/Nemucod Downloads Legitimate Installer
JS/Nemucod is the detection name given to a family of malicious JavaScript downloaders that have appeared in spam campaigns since last year....
Microsoft’s June Patch Kills Potential CFG Bypass
After applying Microsoft’s June patch, we noticed some interesting changes that prevent a security bypass of Windows’ Control Flow Guard...
No More Ransom: A New Initiative to Battle Ransomware
This blog was written by Bruce Snell. Ransomware has seen a huge increase over the past couple of years. According...
Everyday Hero: 5 Questions with McAfee Labs’ Paula Greve
iWith cybersecurity experts taking center stage this week at the Black Hat conference in Las Vegas, the world is watching...
5 Tips for Avoiding Android Malware
The ubiquity of mobile phones has created a unique opportunity for cybercriminals. They now have a way of accessing both...
McAfee AMSI Integration Protects Against Malicious Scripts
This blog describes how the AMSI (Antimalware Scan Interface) is used within the various McAfee products, and highlights some of the malware we are able to detect with it.
What Is the CurveBall Bug? Here’s What You Need to Know
Today, it was announced that researchers published proof of concept code (essentially, an exercise to determine if an idea is a reality) that exploits a recently patched vulnerability in...
Why Taking Your Teen’s Phone Away Doesn’t Work Anymore
If you are the parent of a tween or teen, you know the challenge of setting and following through with consequences. If you are like many parents, your first instinct is to restrict the thing they love the most, which is communication with their peers and the dependence they have ...