Featured Blogs
Instagram credentials Stealer: Disguised as Mod App
Authored by Dexter Shin McAfee’s Mobile Research Team introduced a new Android malware targeting Instagram users who want to increase...
Insights on the Capabilities of Three Politically-Themed Ransomware Campaigns
We all hear politicians’ names week over week – what policies they’re working on, new initiatives they’re implementing for their...
Insider Threat at Coca-Cola Compromises 8,000 Employees’ Information
Cybercrime is often seen as a battle of good versus evil – a hacker tries to infiltrate a system while...
Inside Adobe Reader Zero-Day Exploit CVE 2011-2462
Recently a critical vulnerability has been identified in Adobe Reader X and Adobe Acrobat X Versions 10.1.1 and earlier for...
Inside a Modern-Day Smart Home
Ever wonder how the Internet of Things (IoT) first began? Often regarded as the first IoT device, John Romkey created...
Information Operations an Integral Part of Cyberwarfare
Weapons and the skills to use them are not the only decisive elements in warfare. Rhetoric and imagery are important,...
Infected Minecraft Apps Could Potentially Turn Over 2M Android Devices Into a Botnet Army
We all love a good game, especially those that allow us to create and innovate with the touch of our...
Indians Are Increasingly Realising Nothing Said Online Is Private
The world is becoming increasingly connected- with locks for you home controlled on your smartphone; CCTV cameras in every room...
Indian Digital Citizens Need to Better Balance Their Device Use and Manage Online Safety
As Bryan Adams croons in the background (Everything I do) I do it for you…. and you give the last...
Independent Lab Tests Show that McAfee Stops Malware Dead in Its Tracks
Concerned about ransomware? McAfee stops it dead in its tracks. Newly published findings from the independent labs at AV-TEST show...
Inclusion Drives Innovation: An Employee’s Perspective on Being Differently Abled
By Karla Jackson, Digital Media Specialist, McAfee “With Our People at The Heart, We Are McAfee.” If you make your...
In NTDLL I Trust – Process Reimaging and Endpoint Security Solution Bypass
Process Reimaging Overview The Windows Operating System has inconsistencies in how it determines process image FILE_OBJECT locations, which impacts non-EDR...
In Memory of Peter Szor
Nov. 20: Update with details of memorial service at the end of this post. Earlier this week the security industry...
In 2019 the Threat is “Everywhere Malware”, Not just Mobile Malware
This time last year, we said that 2018 would be the year of mobile malware. Today at MWC, we’re calling...
Improve Your Google Account Privacy
This blog was written by Bruce Snell. I’ve had a number of questions come in lately via email, social media...
Improve Protection Against Cyberattacks Through Shared Threat Intelligence
This blog post was written by Rick Simon. At the RSA Conference 2016 in San Francisco, Chris Young, GM and...
Imposter Netflix Chrome Extension Dupes 100k Users
Authored by Oliver Devane, Vallabh Chole, and Aayush Tyagi McAfee has recently observed several malicious Chrome Extensions which, once installed,...
Importance of Renewing Your Security Software on a Regular Basis – Part II
Let’s start by refreshing all that we discovered in my previous blog, where I was telling Reena about harmful malware...
Importance of Cybersecurity Lessons in Schools
Are you aware that there are more than 460 million internet users in India, and this is expected to grow...
Ileana D’Cruz Tops ‘McAfee Most Sensational Celebrity’ List for 2018
We Indians love our movies and actors and voraciously consume all Page 3 gossip tidbits on them. Our love affair...
If You Give A Hacker Your Email Address…
Your email address, innocuous as it may seem, is often one of the gateways into your digital persona. This article aims to shed light on the potential dangers and impacts of giving away your email address to the wrong people.
If You Deploy Only Antivirus, It Will Cost You More and Make You Less Secure
Everyone’s looking to shave their IT budgets, manage fewer vendors and streamline. The plethora of low cost and sometimes free...
IE Scripting Flaw Still a Threat to Unpatched Systems: Analyzing CVE-2018-8653
Microsoft recently patched a critical flaw in Internet Explorer’s scripting engine that could lead to remote code execution. The vulnerability...
iDroid Bot for Sale Taps Into Mobile Wallets
During recent weeks we’ve seen a new botnet kit advertised in several Russian forums. The iDroidbot costs US$1,500 and targets...
Identity Theft 101: Five Smart Tech Tips for College-Bound Kids
Starting college marks the first of many adulting firsts — first dorm room, first roommate, first no-curfew-on-a-school-night — indeed, there...
Identity Protection Service: The Best Solution to a Growing Problem
I’m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history...
iBanking Mobile Trojan Poses as Facebook Token Generator
Mobile banking Trojans have usually pretended to be security applications (for example, Zitmo) or legitimate banking apps (FakeToken or FkSite a.k.a....