Featured Blogs
Java Back Door Acts as Bot
The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found...
Java Zero-Day Vulnerability Pushes Out Crimeware
This blog was updated on January 14. See the end of the file. A new Java zero-day vulnerability is spreading...
JAVA-VBS Joint Exercise Delivers RAT
The Adwind remote administration tool (RAT) is a Java-based backdoor Trojan that targets various platforms supporting Java files. For an...
JavaScript Apps on Google Play Steal Korean Phone Numbers
In a recent blog, McAfee Labs reported on suspicious JavaScript-based Android chat applications for Japanese users. These apps were found...
JavaScript-PHP Joint Exercise Delivers Nemucod Ransomware
The ransomware Nemucod has been very prevalent in the last few months. Nemucod’s habit of frequently changing its delivery mechanism...
Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423
In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft’s Jet Database Engine....
Jumping Into the Flames of Skywiper
There has been quite a bit of analysis and speculation about the Flamer/Skywiper threat. As we started to analyze this...
June #SecChat Recap: Findings from the 2016 Verizon DBIR
This year’s highly anticipated Verizon 2016 Data Breach Investigations Report (Verizon DBIR) analyzed cybersecurity findings from 100,000 incidents and 2,260...
Just One of Many Internet Scams
A good friend of mine called me recently to ask what I knew about scams from online sales. He had...
Keep It Real: How McAfee Is Using AI to Fight AI—and End Scam Stigma
Was that spinning head a mistake—or the whole point? When McAfee dropped a new digital ad showing a woman lounging...
Keep Remote Classes Safe and in Session: What You Need to Know About Netop Vision Pro
Keep Remote Classes Safe and in Session: What You Need to Know About Netop Vision Pro Distance and hybrid learning...
Keep the Change: 3 Tips for Using the Twitter Tip Jar
When we think of tipping, many don’t see it as anything beyond a display of gratitude. However, Twitter’s latest feature is prompting its users to rethink this sentiment. It hasn’t been long since Twitter...
Keep Your Computer Close: PoisonTap Can Unlock It Almost Instantly
It’s never a good idea to leave your computer unattended. Since it carries mounds of valuable data, an unchaperoned computer...
Keep Your Data Safe While Unplugging on Vacation
When you are packing your bags for a long weekend break or a family holiday, do you pack all your...
Keep Your Guard Up: Sports Streaming Sites Yield Hidden Dangers
Just as every dog has its day, so too do sports. The NBA finals, the Playoffs, the Stanley Cup —...
Keep Your Mum Safe This Mother’s Day!
On my first Mother’s Day 21 years ago, I received a pair of gorgeous fluffy pink slippers. Last year –...
Keeping Kids Safe from Online Threats
The majority of domestic tech devices, such as personal computers and smartphones, only have basic consumer antivirus software, if any at all. This puts children at significant risk of falling victim to cyber threats like malware and phishing attacks.
Keeping Virtual Play Dates, Hangouts, and Video Chats Safe for Everyone
While virtual playdates, hangouts, and video chats provides an excellent solution for children to interact with their peers, it has also opened up a new avenue for potential risks and dangers. In this article, we will provide some essential strategies for maintaining a secure and enjoyable online social environment for ...
Keeping Your Mobile Device (and Your Personal Life) Safe with IoT
Life is made up of the little things. There are ‘fuzzy feeling’ little things; like when the nice lady in...
Key Considerations for Consumers Around Data Privacy
It’s 2018 – and though we’re not living in the age of flying cars, we are living in an age...
Key Findings from our Survey on Identity Theft, Family Safety and Home Network Security
The world is connecting to the internet now more than ever before. As a result, the popularity of connected devices...
Key Innovations and Takeaways from CES 2018
Every year, practically everyone in the consumer electronics industry catches a flight and heads to Las Vegas for The International...
Key Lessons From Verizon’s ‘2016 Data Breach Investigations Report’
The annual Data Breach Investigations Report (DBIR) is out and reinforces the value of well-established cybersecurity practices. The good folks...
Key Mobile Threat Takeaways from the 2018 Mobile Threat Report
The term “mobile” has come to encompass a wide range of devices these days. Mobile devices have become much more...
Key Takeaways for Consumers From Our 2018 Threats Predictions Report
As 2017 winds down, we all start looking ahead and anticipate what’s to come for 2018. For us at McAfee,...
Kicking Off a New School Year with New Online Habits
Most every parent loves a new school year. Most likely because the beloved milestone offers us a clean slate and...
Kicking off CES 2019 with New Security Solutions and Collaborations
Today, we at McAfee are announcing some exciting new security solutions and integrations at CES in Las Vegas. For those...