Featured Blogs
Everything You Need to Know to Keep Your Passwords Secure
How do you manage all those user names and passwords without having a cheat sheet in a file on your computer or stuck on post-it notes next to your computer? Neither option provides the security you should reserve for passwords.
Evolution of Android Malware: IRCBot Joins the Party
We all know how fast the smart phone market is growing. Along with it, the complexity and the numbers of...
Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study
Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the...
Evolved IoT Linux Worm Targets Users’ Devices
Since the early ‘90s, Linux has been a cornerstone of computer operating systems. Today, Linux is everywhere — from smartphones...
Evolving Marketing Innovation – Our Strategy in the Security Technology Industry
Every year we recognize partners for achieving excellence in a variety of categories. Last month at our Americas Partner Summit,...
Evolving Security Products for the new Realities of Living Life From Home
Announcing McAfee’s Enhanced Consumer Security for New Consumer Realities With millions of people continuing to work and study remotely, scammers have...
Examining Code Reuse Reveals Undiscovered Links Among North Korea’s Malware Families
Attacks from the online groups Lazarus, Silent Chollima, Group 123, Hidden Cobra, DarkSeoul, Blockbuster, Operation Troy, and 10 Days of Rain are believed to have come from North Korea. But how can we know with certainty?
Examining the Link Between TLD Prices and Abuse
This blog was written by Charlie Feng. Briefing Over the years, McAfee researchers have observed that certain new top-level Domains...
Examining Your Very Own Sefnit Trojan
Most malware is created for economic purposes. To name just a few of our reports and blogs on this topic,...
Experts Discuss the 2016 Verizon DBIR: June #SecChat
Cybersecurity in 2016 has been full of sensational headlines. Ransomware has shut down multiple hospitals, millions of credentials have been...
Expiro Malware Is Back and Even Harder to Remove
File infector malware adds malicious code to current files. This makes removal tricky because deleting infections results in the loss...
Explaining DeepSeek: The AI Disruptor That’s Raising Red Flags for Privacy and Security
The artificial intelligence arms race has a new disruptor—DeepSeek, a Chinese AI startup that has quickly gained traction for its...
Exploit Kits Improve Evasion Techniques
Exploit kits are toolkits that malicious developers use to take advantage of client-side vulnerabilities, targeting web browsers and programs that...
Exploring Winrar Vulnerability (CVE-2023-38831)
Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is related to an...
Extend Mobile Call Time with Battery Optimizer
Nowadays, most people are constantly on the go–multi-tasking while moving from one place to the next. The majority of the...
Extortion Fraud is Still on the Rise
Authored by Lakshya Mathur and Sriram P McAfee Intelligence observed a huge spike in extortion email frauds over the past month....
Facebook Announces Security Flaw Found in “View As” Feature
Another day, another Facebook story. In May, a Facebook Messenger malware named FacexWorm was utilized by cybercriminals to steal user...
Facebook Bot Spreads Through Chat Messengers [Updated]
Update from Facebook: The Facebook security team been actively tracking this botnet and providing McAfee AV to the victims (via...
Facebook Messenger Flaw Could’ve Allowed Criminals to Intercept Messages
When it comes to day-to-day communications, we are—to put it mildly—married to our messaging applications. Which is why it’s worrying...
Facebook Messenger Malware FacexWorm Steals Passwords and Mines for Cryptocurrency
Facebook Messenger, a feature included within the popular social media network, has grown to become a widely-used platform for friends...
Facebook Users: Here are Proactive Tips to Keep Your Data Safe
Social media has become extremely popular over the years, providing users with an easy way to communicate with their friends...
Facebook’s Plans to Merge Messaging Platforms: What This Means for Online Safety
Integration: it seems to be all the rage. As technology becomes more sophisticated, we sprint to incorporate these new innovations...
Facing the Fear of Public Speaking with Toastmasters
By: DaWane, Sales Director Standing in front of 800 parents and fellow students to deliver the welcome address, thoughts swirled...
Fad Diet Ads Online Open the Door for Cybercriminals
Fad diets have tempted people throughout history. At the turn of the 20th century, the Tapeworm Diet was the trend...
Fake Android and iOS apps steal SMS and contacts in South Korea
Authored by Dexter Shin Most people have smartphones these days which can be used to easily search for various topics...
Fake Android Update Delivers SMS, Click Fraud in Europe
McAfee Mobile Research has been monitoring a mobile malware campaign targeting users in Germany, France, and Russia since the beginning...
Fake AntiVirus Pop Ups, Mac Edition
I often hear Mac users say “Oh, I don’t have to worry about viruses. I have a Mac!” Well, unfortunately,...