Featured Blogs
Hacker Leaves Online Trail, Loses Anonymity
Since March 20, the @Anonw0rmer Twitter account has been silent. Its owner, w0rmer, is known as a member of the...
Hacked for the Holidays: Preparing Your Home for Hackable Toys
The holidays are in full swing and all my kids can think about is their wishlist. With so many new...
Hackable?” Tests Whether Car Key Fobs Are Secure
Smart key fobs make it easy to open your car, pop the trunk, and start driving without fumbling around for...
Hackable? Is Putting Virtual Reality to the Test
From gaming to helping people conquer their fear of spiders and getting quarterbacks ready for Sunday, virtual reality is a...
Hack-ception: Benign Hacker Rescues 26M Stolen Credit Card Records
There’s something ironic about cybercriminals getting “hacked back.” BriansClub, one of the largest underground stores for buying stolen credit card...
Hack the Vote: Pros and Cons of Electronic Voting
After 17 months and billions in campaign spending, it was up to the scores of American people who flooded churches,...
GUloader Unmasked: Decrypting the Threat of Malicious SVG Files
Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep understanding...
GULoader Campaigns: A Deep Dive Analysis of a highly evasive Shellcode based loader
Authored by: Anandeshwar Unnikrishnan Stage 1: GULoader Shellcode Deployment In recent GULoader campaigns, we are seeing a rise in NSIS-based...
Guide To Online Banking Safety for Confident Consumers
A recent poll revealed that 54% of U.S. consumers said the theft of their personal or financial information worried them...
Group Chat Etiquette: 10 Tips to Help Your Family Navigate the Digital Chatter
Technology is touching and transforming nearly every area of our lives, especially our relationships. Group chat, for instance, is replacing...
Grabos Malware Discovered On 144 Trojanized Android Apps
This blog was updated March 2018. Cybercriminals have been practically relentless in their attacks against the Android OS, and McAfee’s...
Google’s Project Zero: Good News for Cyber Security
Google has assembled a team of counter-hackers to search, identify and patch zero day vulnerabilities and malware across the Web....
Google Tool Cleans Up Mobile Malware ‘Dream’
Over the weekend Google released the Android Market Security Tool to help clean up devices infected with the DroidDream malware. The Android/DrdDream...
Google Play Users Risk a Yellow Card With Android/FoulGoal.A
This blog post was co-written by Irfan Asrar. English soccer fans have enthusiastically enjoyed the team’s current run in the...
Google Just Made Unlocking Your Phone Easier. But is that Good or Bad?
It’s the last week in June and the sun is shining and the birds are chirping and the dogs are...
Google Docs Phishing Campaign is Frighteningly Accurate
Gmail users beware: a very convincing, very deceitful, phishing scam has been making its way around the Internet. The scam...
Google Code Projects Host Android Malware
[March 1: See update at end] Google Code is a well-known platform that provides a collaborative environment for developers working...
Google Brings Safe Browsing to the Masses With Its Safe Browsing API
The best way to protect yourself from the malicious programs (often called malware) hidden across the Internet, is to have...
Goldoson: Privacy-invasive and Clicker Android Adware found in popular apps in South Korea
Authored by SangRyol Ryu McAfee’s Mobile Research Team discovered a software library we’ve named Goldoson, which collects lists of applications...
Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems
McAfee Advanced Threat Research (ATR) recently released a report describing a fileless attack targeting organizations involved with the Pyeongchang Olympics. The attack used a PowerShell implant that established a channel to the attacker’s server to gather basic system-level data. What was not determined at that time was what occurred after ...
Going The Extra Mile: Pandora, Facebook, and Netflix Ask Users to Reset Passwords
It’s a good sign when businesses take the initiative to protect consumers’ online safety. Not only does it allow customers...
Gmail Users: App Developers Can Potentially Read Your Private Emails
Email has been the norm for decades now, as most digitally connected people use it to communicate in both their...
Global Malware Campaign Pilfers Data from Multiple Industries
McAfee Advanced Threat Research analysts have uncovered a global data reconnaissance campaign assaulting a wide number of industries including critical...
Global Community Service Day 2018: Together for good
By: Emily, Communications Program Manager When I finished college, I went to work for the same nonprofit youth sports organization...
Giving Back: McAfee Global Community Service Day
This past Thursday, McAfee had its 3rd annual Global Community Service Day (GCSD). With McAfee’s workforce turning up to volunteer...
GitHub’s Dark Side: Unveiling Malware Disguised as Cracks, Hacks, and Crypto Tools
Authored by Aayush Tyagi Video game hacks, cracked software, and free crypto tools remain popular bait for malware authors. Recently,...
Gift Your Kids The Know-How To Maintain A Healthy Digital Reputation
The Digital India initiative by the Government of India is aimed at ushering in a digitally empowered society. One of...