Featured Blogs
Like This Post – And Get Hacked
Admit it. Social media has made your world a little smaller—and it’s all in the palm of your hands. Our...
LilyJade Version 2.0: a Malicious Browser Extension
In order to gain popularity and usability, web browsers offer extra features. Chief among these are browser plug-ins, which can...
Linux Kernel Vulnerability Can Lead to Privilege Escalation: Analyzing CVE-2017-1000112
This blog was written by Krishs Patil. A memory corruption bug in UDP fragmentation offload (UFO) code inside the Linux...
Little Ones Online More? Here Are 10 Basics To Keep Them Safe
Online safety conversations look dramatically different depending on the age and stage of your child. For very young children, toddlers...
Live Streaming – The Good, The Bad & The Ugly
Listen up parents: live streaming is the latest trend that you need to get your heads around. Not only are...
LizaMoon the Latest SQL-Injection Attack
Working in the security industry brings about a myriad of challenges. This is especially true for vendors. We must do...
Location Apps: Who’s Tracking Your Kids?
Last week we talked about the dangers that can arise with apps that allow anonymous users to interact. Equally concerning...
Location, Location, Location: Three Reasons It Matters for Your Smartphone
With its built-in location services, your smartphone can point you to plenty of places. To the location of your vacation...
Lock Down & Level Up: Protect Your Online Gaming from Hackers
As a gamer, you love the stuff you’ve racked up over the years—that rare Fortnite skin from six seasons ago,...
LockerGoga Ransomware Family Used in Targeted Attacks
Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga,...
Locky Ransomware Hides Inside Packed .DLL
McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in an earlier blog). Locky is aggressively...
Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript
This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni. During the last couple of weeks,...
Locky Ransomware on Rampage With JavaScript Downloader
Locky is a ransomware family that encrypts victims’ files and demands money to decrypt the files. It has infected many...
Look Before You Leap: Imposter DeepSeek Software Seek Gullible Users
Authored by Aayush Tyagi and M, Mohanasundaram *Bold = Term Defined in Appendix In this blog, we discuss how malware...
Looking Ahead to 2021: The Things We’ll Carry Forward
Looking Ahead to 2021: The Things We’ll Carry Forward Right now, I’m thinking about how my life changed in 2020....
Looking Into the World of Ransomware Actors Reveals Some Surprises
During the preparations for our keynotes at McAfee’s recent MPOWER conference, we brainstormed a few topics we wanted to share...
Lost or Stolen Mobile Devices Can Lead to Identity Theft
We lose stuff. You put something down, you get distracted, you forget about it and it’s gone. Stuff falls out...
Lost Your Luggage? There’s an App for That
Did you know that worldwide, 1% of all luggage was mishandled last year—a percentage that may seem small, but actually...
Love Bytes – How AI is shaping Modern Love
AI has made the dating scene. In a big way. Nearly one in four Americans say they’ve spiced up their...
Love, Relationships, and #SextRegret: It’s Time to Take Back the Web
What would you do if someone threatened to post risqué photos of you on the Internet? According to a new...
Love, Trust and Text Messages in the Digital Age
Roses are red, violets are blue, but does your security matter to your loved one too? Okay, so maybe my...
Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation
Authored by: M. Authored by: M, Mohanasundaram and Neil Tyagi In today’s rapidly evolving cyber landscape, malware threats continue to...
Mac ‘Protector’: Another Fake-Alert in Disguise
It’s not breaking news that fake-alert Trojans infections are growing. But it’s worrying for Mac OS X users to find...
Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection
Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans...
Macro Malware Associated With Dridex Finds New Ways to Hide
Macro malware is on the upswing and cybercriminals are always searching for new ways to deceive users and evade detection....
Macro Malware Employs Advanced Obfuscation to Avoid Detection
Attacks by macro malware carrying ransomware are growing, as we have recently reported on Blog Central here and here. Now McAfee Labs...
Macro Malware Employs Advanced Sandbox-Evasion Techniques
During the past couple of weeks, McAfee Labs has observed a new variant of macro malware. With this variant when...