Featured Blogs
Grabos Malware Discovered On 144 Trojanized Android Apps
This blog was updated March 2018. Cybercriminals have been practically relentless in their attacks against the Android OS, and McAfee’s...
Group Chat Etiquette: 10 Tips to Help Your Family Navigate the Digital Chatter
Technology is touching and transforming nearly every area of our lives, especially our relationships. Group chat, for instance, is replacing...
Guard Your Android Phones Against Loss of Data and Infected Apps
Because Android uses an open source operating system, it usually gets a bad rap for being vulnerable to data loss...
Guide To Online Banking Safety for Confident Consumers
A recent poll revealed that 54% of U.S. consumers said the theft of their personal or financial information worried them...
GULoader Campaigns: A Deep Dive Analysis of a highly evasive Shellcode based loader
Authored by: Anandeshwar Unnikrishnan Stage 1: GULoader Shellcode Deployment In recent GULoader campaigns, we are seeing a rise in NSIS-based...
GUloader Unmasked: Decrypting the Threat of Malicious SVG Files
Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep understanding...
Hack the Vote: Pros and Cons of Electronic Voting
Every four years, scores of American people flood churches, schools, homes, and auditoriums to cast their ballots for the future...
Hack-ception: Benign Hacker Rescues 26M Stolen Credit Card Records
There’s something ironic about cybercriminals getting “hacked back.” BriansClub, one of the largest underground stores for buying stolen credit card...
Hackable? Is Putting Virtual Reality to the Test
From gaming to helping people conquer their fear of spiders and getting quarterbacks ready for Sunday, virtual reality is a...
Hackable?” Tests Whether Car Key Fobs Are Secure
Smart key fobs make it easy to open your car, pop the trunk, and start driving without fumbling around for...
Hacked for the Holidays: Preparing Your Home for Hackable Toys
The holidays are in full swing and all my kids can think about is their wishlist. With so many new...
Hacker Leaves Online Trail, Loses Anonymity
Since March 20, the @Anonw0rmer Twitter account has been silent. Its owner, w0rmer, is known as a member of the...
Hackers are Cashing in on Instagram Likes
They say popularity has its price. This saying holds a new weight when it comes to the growing influence of...
Hackers Pull off a Crafty Attack on Michaels
Customers of nationwide arts and crafts retailer, Michaels, may have something messier to clean up than their latest DIY creation....
Hackers Tee Up a Ransomware Attack for the PGA Ahead of the 2018 Championship
Fore! That’s not a ball hitting the 9th hole, that’s a ransomware attack. You heard correctly – the PGA (Professional...
Hackers Trick Staff Into Exposing Major Companies’ Salesforce Data–Find Out if You’re Safe
Cybercriminals tricked employees at major global companies into handing over Salesforce access and used that access to steal millions of...
Hacking Humans: How Cybercriminals Trick Their Victims
McAfee has compiled a list of the top ways cybercriminals play with the minds of their targeted victims. And the...
Hacking Summit Names Nations With Cyberwarfare Capabilities
In 2009, I read with great interest a paper published in the Journal of International Security Affairs titled The Art...
Hacking the Human OS: A Report on Social Engineering
Why are data breaches so commonplace? Whether the attacks are against the energy sector as reported July 2014[i] with over...
Hacking Your Phone and the Internet of Things
Wouldn’t it be fantastic if your refrigerator could inform you when it was out of milk, or vegetables? And wouldn’t...
Hacktivists Turn to Phishing to Fund Their Causes
At McAfee we recently observed a phishing campaign targeting Apple account holders. The link directed the user to a compromised WordPress...
Hallucinating Headlines: The AI-Powered Rise of Fake News
The number of AI-powered fake news sites has now surpassed the number of real local newspaper sites in the U.S....
HANCITOR DOC drops via CLIPBOARD
By Sriram P & Lakshya Mathur Hancitor, a loader that provides Malware as a Service, has been observed distributing malware such as...
Hancitor Making Use of Cookies to Prevent URL Scraping
This blog was written by Vallabh Chole & Oliver Devane Over the years, the cybersecurity industry has seen many threats...
Handling Social Media Stress for Teens
Our society is undeniably superbly interconnected, and our digital persona is greatly treasured. However, this isn't always beneficial, especially for teenagers who may be overwhelmed by the deluge of information, leading to stress.
Hang Up on Hackers: Protect Yourself from Mobile App Video Conferencing Vulnerabilities
Hang Up on Hackers: Protect Yourself from Mobile App Video Conferencing Vulnerabilities Whether they’re attending regular work meetings or catching...
Happy New Year 2019! Anatova is here!
During our continuous hunt for new threats, we discovered a new ransomware family we call Anatova (based on the name...
