Featured Blogs
Running from Ransomware: A Mobile User’s Guide
From the second my alarm goes off, my day goes 100 miles a minute. In addition to getting myself ready...
RTF Zero-Day Attack CVE-2014-1761 Shows Sophistication of Attackers
A serious RTF zero-day attack has struck recently. McAfee detection solutions were provided a couple of days ago that allowed...
RTF Attack Takes Advantage of Multiple Exploits
This is a joint analysis by Haifei Li, Stanley Zhu, and Jun Xie of McAfee Labs Recently, the rich text...
Rovnix Downloader Updated with SinkHole and Time Checks
McAfee Labs has found that the latest Rovnix downloader now comes with the capability to check for the sinkholing of...
RottenSys Malware Reminds Users to Think Twice Before Buying a Bargain Phone
China is a region that has been targeted with mobile malware for over a decade, as malware authors there are...
Roses Are Red, Violets Are Blue – What Does Your Personal Data Say About You?
A classic meet-cute – the moment where two people, destined to be together, meet for the first time. This rom-com...
Rooting Exploit for Android Works Silently
In our last blog about Android malware, we discussed the expanding threat landscape for Android malware. Recently, we received an...
Rogue Drones Cause Gatwick Airport to Close for Over 30 Hours: More on This Threat
As the Internet of Things works its way into almost every facet of our daily lives, it becomes more important...
RockYou2024: Unpacking the Largest Password Leak in History
This Fourth of July brought fireworks in the form of a digital security breach, one that has been recorded as...
ROCA: Which Key-Pair Attacks Are Credible?
This blog was co-written by Brook Schoenfield. In the past two weeks, we have seen two big encryption issues arise:...
Robot Character Analysis Reveals Trust Issues
Retired Marine fighter pilot and Top Gun instructor Dave Berke said “Every single thing you do in your life, every...
Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware
The Roaming Mantis smishing campaign has been impersonating a logistics company to steal SMS messages and contact lists from Asian...
Risky Selfie Trend: Snapping and Driving
Just when you thought the dangerous selfie craze was winding down, there’s a whole new trend that poses a risk to drivers....
Risky Apps, Jail Time for Parents of Bullies, and More Family Safety News
If you haven’t been able to skim the family safety headlines lately — no worries. We’ve plucked a few stories...
Rising Scams in India: Building Awareness and Prevention
Authored by Anuradha, Sakshi Jaiswal In 2024, scams in India have continued to evolve, leveraging sophisticated methods and technology to...
Rise of LNK (Shortcut files) Malware
An LNK file is a Windows Shortcut that serves as a pointer to open a file, folder, or application. LNK files are based on the Shell Link binary file format, which holds information used to access another data object. McAfee Labs has seen a rise in malware being delivered using ...
Rise in Deceptive PDF: The Gateway to Malicious Payloads
Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the distribution of prominent...
Ripple20 Vulnerability Mitigation Best Practices
On June 16th, the Department of Homeland Security and CISA ICS-CERT issued a critical security advisory warning covering multiple newly discovered vulnerabilities affecting...