Featured Blogs
Mobile and Digital Payments: Worth the Risk?
Thanks in part to the convenience that our mobile devices provide for us, much of the world operates now on...
Misuse of DocuSign Email Addresses Leads to Phishing Campaign
DocuSign, which provides electronic signatures and digital transaction management, reported that email addresses were stolen by an unknown party on...
Missing Hotel Room Key? Try Your Phone
If you are like me, there are times when you will misplace your hotel key. Times when you’re switching a...
Mirror Mirror Online, Who Is the Most Dangerous Celebrity of Them All?
We all do it. We probably all just don’t admit it. Well I admit it—I’ve searched for that elusive picture...
Mirai, BrickerBot, Hajime Attack a Common IoT Weakness
This blog post was written by Rick Simon. We know that devices in the Internet of Things make enticing targets...
Mirai Botnet Creates Army of IoT Orcs
This post was based on analysis by Yashashree Gund and RaviKant Tiwari. There is a lot of speculation in the...
Millions Possibly Affected by Newly Discovered Stegno Malvertising
When it comes to deception, cybercriminals have many options at their disposal. There’s phishing, where crooks posing as an authority...
Millions of Verizon Customers’ Phone Numbers and Accounts PINs Exposed
When your phone is experiencing an issue, you call support, ask for technical tips, and provide personal information when necessary....
Millions of iOS and Android Users Could Be Compromised by Bluetooth Bug
Similar to smartphones and computers, Bluetooth is one of the modern-day pieces of tech that has spread wide and far....
Millions of Facebook Users May Have Unknowingly Shared Posts Publicly
Facebook, Facebook, Facebook – between malware leveraging Facebook Messenger to send phishing messages, to apps on the platform mishandling customer...
Millions of Car Buyer Records Exposed: How to Bring This Breach to a Halt
Buying a car can be quite a process and requires a lot of time, energy, and research. What most potential...
Millions of Android Devices Hit With CopyCat Malware
Time and time again, we’ve seen Android malware make its way through mobile devices around the world. Now, a new...
Millions Affected by Malware Attributed to Android Barcode-Scanning App
We’ve all come to a realization that we don’t go anywhere without our phone. It’s a utility that helps us...
Millennials Choose Convenience Over Security When it Comes to Information Sharing
For better or for worse, we’ve ended up amidst a society built on information sharing. There are a number of...
Microsoft’s June Patch Kills Potential CFG Bypass
After applying Microsoft’s June patch, we noticed some interesting changes that prevent a security bypass of Windows’ Control Flow Guard...
Microsoft’s Edge over Popups (and Google Chrome)
Following up on our previous blog, How to Stop the Popups, McAfee Labs saw a sharp decrease in the number...
Microsoft Urges Customers to Update Windows as Soon as Possible
What happened Microsoft has shipped an emergency security update affecting most Windows users. This update partially addresses a security vulnerability known as PrintNightmare that could allow...
Microsoft Kills Potential Remote Code Execution Vulnerability in Office (CVE-2017-8630)
Recently the McAfee IPS Research Team informed Microsoft about a potential remote code execution vulnerability in Office 2016 that McAfee...
Microsoft Discovers Malware in Word Files! Here’s What You Need to Know
Microsoft Word is omnipresent. Students use it for their academic careers and office workers, well, office workers pretty much live...
Microsoft Cortana Allows Browser Navigation Without Login: CVE-2018-8253
A locked Windows 10 device with Cortana enabled on the lock screen allows an attacker with physical access to the device to do two kinds of unauthorized browsing.
Microsoft Agrees: Home Users Need More than Antivirus Alone
After years of telling users that Microsoft Security Essentials was enough to protect their PCs from security threats, Microsoft has...
Messenger Rooms: New Video Chat Option is Fun But Has Risks
One of the many things we’ve learned during this season of being homebound is that video chats with friends can...
Meltdown and Spectre Aren’t Done Just Yet – New Malware Uses Exploits to Attack Browsers
We kicked off 2018 with two powerful new exploits: Meltdown and Spectre. And since the discovery of Meltdown and Spectre...
Meltdown and Spectre 101: What to Know About the New Exploits
Between the Blueborne vulnerabilities and the High Sierra Mac flaw – we saw some nasty bugs in 2017. Now, 2018...
Meet McAfee WebAdvisor’s New Cryptojacking Blocker
totalBy now, you’ve probably heard of cryptocurrency, but you may not know exactly what it is. To put it simply,...
Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes
If there’s one reason why classic James Bond films are so widely enjoyed, it’s because of the unbeatable gadgets. From...
Meet IoT_reaper: The New Malware Building a Massive Botnet Army
WannaCry, Petya, the Dyn distributed denial-of-service (DDoS) attack – all now infamous cyberattacks that have defined the modern threat landscape....