Featured Blogs
MalBus: Popular South Korean Bus App Series in Google Play Found Dropping Malware
McAfee’s Mobile Research team recently learned of a new malicious Android application masquerading as a plugin for a transportation application...
MalBus Actor Changed Market from Google Play to ONE Store
Authored by: Sang Ryol Ryu and Chanung Pak McAfee Mobile Research team has found another variant of MalBus on an...
Making Online Safety a Priority for Our Tech-Savvy Children
The joy of parenthood! We offer our children the best opportunities to help them become happy, healthy, responsible and educated...
Making Moves to Go Green at McAfee Waterloo
By Gurjeet, Software Engineer, Canada “We should protect Mother Earth. If we don’t take care of her, she won’t take...
Make Your Smart Home a Secure Home Too: Securing Your IoT Smart Home Devices
It’s only a smart lightbulb. Why would anyone want to hack that? Great question. Because it gets to the heart...
Make a Hacker’s Job Harder with Two-step Verification
Using identical passwords is convenient for us as users, but it’s also convenient for any hacker trying to steal personal information—once a hacker has access to one of your accounts, he can use a recycled password to snoop around at will.
Major Websites Twitter, Spotify, Netflix Shut Down by DDoS Attack
We’re no strangers to Armageddon-scenario movies, but today a real disaster hit the internet. Using brute-force tactics that flood key...
Major International Airport’s Security System Found for Sale on Dark Web RDP Shop
The closest many of us get to the dark web is watching hackers surf it in television shows or movies....
Major HTTP Vulnerability in Windows Could Lead to Wormable Exploit
Today, Microsoft released a highly critical vulnerability (CVE-2021-31166) in its web server http.sys. This product is a Windows-only HTTP server...
Macro Malware Targets Macs
Macro malware has been spreading for years. New techniques arise all the time to hide malicious code and thus increase...
Macro Malware Employs Advanced Sandbox-Evasion Techniques
During the past couple of weeks, McAfee Labs has observed a new variant of macro malware. With this variant when...
Macro Malware Employs Advanced Obfuscation to Avoid Detection
Attacks by macro malware carrying ransomware are growing, as we have recently reported on Blog Central here and here. Now McAfee Labs...
Macro Malware Associated With Dridex Finds New Ways to Hide
Macro malware is on the upswing and cybercriminals are always searching for new ways to deceive users and evade detection....
Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection
Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans...
Mac ‘Protector’: Another Fake-Alert in Disguise
It’s not breaking news that fake-alert Trojans infections are growing. But it’s worrying for Mac OS X users to find...
Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation
Authored by: M. Authored by: M, Mohanasundaram and Neil Tyagi In today’s rapidly evolving cyber landscape, malware threats continue to...
Love, Trust and Text Messages in the Digital Age
Roses are red, violets are blue, but does your security matter to your loved one too? Okay, so maybe my...
Love, Relationships, and #SextRegret: It’s Time to Take Back the Web
What would you do if someone threatened to post risqué photos of you on the Internet? According to a new...
Love Bytes – How AI is shaping Modern Love
AI has made the dating scene. In a big way. Nearly one in four Americans say they’ve spiced up their...
Lost Your Luggage? There’s an App for That
Did you know that worldwide, 1% of all luggage was mishandled last year—a percentage that may seem small, but actually...
Lost or Stolen Mobile Devices Can Lead to Identity Theft
We lose stuff. You put something down, you get distracted, you forget about it and it’s gone. Stuff falls out...
Looking Into the World of Ransomware Actors Reveals Some Surprises
During the preparations for our keynotes at McAfee’s recent MPOWER conference, we brainstormed a few topics we wanted to share...
Looking Ahead to 2021: The Things We’ll Carry Forward
Looking Ahead to 2021: The Things We’ll Carry Forward Right now, I’m thinking about how my life changed in 2020....
Look Before You Leap: Imposter DeepSeek Software Seek Gullible Users
Authored by Aayush Tyagi and M, Mohanasundaram *Bold = Term Defined in Appendix In this blog, we discuss how malware...
Locky Ransomware on Rampage With JavaScript Downloader
Locky is a ransomware family that encrypts victims’ files and demands money to decrypt the files. It has infected many...
Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript
This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni. During the last couple of weeks,...
Locky Ransomware Hides Inside Packed .DLL
McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in an earlier blog). Locky is aggressively...