Featured Blogs
Rooting Exploit for Android Works Silently
In our last blog about Android malware, we discussed the expanding threat landscape for Android malware. Recently, we received an...
Rogue Drones Cause Gatwick Airport to Close for Over 30 Hours: More on This Threat
As the Internet of Things works its way into almost every facet of our daily lives, it becomes more important...
RockYou2024: Unpacking the Largest Password Leak in History
This Fourth of July brought fireworks in the form of a digital security breach, one that has been recorded as...
ROCA: Which Key-Pair Attacks Are Credible?
This blog was co-written by Brook Schoenfield. In the past two weeks, we have seen two big encryption issues arise:...
Robot Character Analysis Reveals Trust Issues
Retired Marine fighter pilot and Top Gun instructor Dave Berke said “Every single thing you do in your life, every...
Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware
The Roaming Mantis smishing campaign has been impersonating a logistics company to steal SMS messages and contact lists from Asian...
Risky Selfie Trend: Snapping and Driving
Just when you thought the dangerous selfie craze was winding down, there’s a whole new trend that poses a risk to drivers....
Risky Apps, Jail Time for Parents of Bullies, and More Family Safety News
If you haven’t been able to skim the family safety headlines lately — no worries. We’ve plucked a few stories...
Rising Scams in India: Building Awareness and Prevention
Authored by Anuradha, Sakshi Jaiswal In 2024, scams in India have continued to evolve, leveraging sophisticated methods and technology to...
Rise of LNK (Shortcut files) Malware
An LNK file is a Windows Shortcut that serves as a pointer to open a file, folder, or application. LNK files are based on the Shell Link binary file format, which holds information used to access another data object. McAfee Labs has seen a rise in malware being delivered using ...
Rise in Deceptive PDF: The Gateway to Malicious Payloads
Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the distribution of prominent...
Ripple20 Vulnerability Mitigation Best Practices
On June 16th, the Department of Homeland Security and CISA ICS-CERT issued a critical security advisory warning covering multiple newly discovered vulnerabilities affecting...
Ripple20 Critical Vulnerabilities – Detection Logic and Signatures
This document has been prepared by McAfee Advanced Threat Research in collaboration with JSOF who discovered and responsibly disclosed the...
Riddle: What’s the One Password You’ll NEVER Forget?
Last week during his keynote speech at the Interop IT conference, PayPal’s Chief Information Security Officer Michael Barrett pointed to...
REvil Ransomware Uses DLL Sideloading
This blog was written byVaradharajan Krishnasamy, Karthickkumar, Sakshi Jaiswal Introduction Ransomware attacks are one of the most common cyber-attacks among...
Revenge Posts on Social Media Could Land You in Jail
After a bad breakup, a scorned lover may choose to channel their anger through ice cream, a good cry, or...
Return to Workplace: Ready to Relaunch Your Career
By: Sheetal, Application Developer & Majy, IT Support McAfee offers a new program that offers professionals who dedicated extended time...
Return of the Hack
As our world has evolved, so has our technology. And, as that technology has evolved, so has its consumption. Now...
Responses to Cybercrime in Japan and France
This week the Sorbonne University and the French Department of Justice hosted a meeting, the World and Development Institute (IMODEV) International...
Researchers Follow the Breadcrumbs: The Latest Vulnerabilities in Windows’ Network Stack
The concept of a trail of breadcrumbs in the offensive security community is nothing new; for many years, researchers on...
Research Shows Parents Need a Pat On the Back But There Is Still Work To Be Done
Sometimes as parents we need a little pat on the back and confirmation we’re doing something right. Well, the McAfee...
Research Reveals Americans’ Perceptions of Device Security Amidst CES 2020
From the Lifx Switch smart switch to the Charmin RollBot to Kohler Setra Alexa-connected faucets, CES 2020 has introduced new...
Reports of Online Predators on the Rise. How to Keep Your Kids Safe.
June is Internet Safety Month. And, with kids spending more time online, stepping up the public conversation about digital risks...
Report: Gaming Addiction is a Real Thing. So What Can Parents Do Next?
It’s one of my biggest parenting regrets to date: About a decade ago, I failed to put limits around my teen’s...
Report Highlights Enterprise Biometric Vulnerabilities, Opportunities
Authentication in the modern enterprise is becoming more difficult. The risks are rising, but adding more security controls can impede...
Report Finds Some Health Apps Aren’t Healthy for Your Privacy
One of the big features in today’s Internet-of-Things-centric world is the ability to effortlessly track and record health-related data. In...
Remote Jeep Hacking Successful: Time to Patch Your Car?
This blog post was written by Bruce Snell. Next month I’ll be moving back to the US after a few...
