Featured Blogs
Extend Mobile Call Time with Battery Optimizer
Nowadays, most people are constantly on the go–multi-tasking while moving from one place to the next. The majority of the...
Exploring Winrar Vulnerability (CVE-2023-38831)
Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is related to an...
Exploit Kits Improve Evasion Techniques
Exploit kits are toolkits that malicious developers use to take advantage of client-side vulnerabilities, targeting web browsers and programs that...
Explaining DeepSeek: The AI Disruptor That’s Raising Red Flags for Privacy and Security
The artificial intelligence arms race has a new disruptor—DeepSeek, a Chinese AI startup that has quickly gained traction for its...
Expiro Malware Is Back and Even Harder to Remove
File infector malware adds malicious code to current files. This makes removal tricky because deleting infections results in the loss...
Experts Discuss the 2016 Verizon DBIR: June #SecChat
Cybersecurity in 2016 has been full of sensational headlines. Ransomware has shut down multiple hospitals, millions of credentials have been...
Examining Your Very Own Sefnit Trojan
Most malware is created for economic purposes. To name just a few of our reports and blogs on this topic,...
Examining the Link Between TLD Prices and Abuse
This blog was written by Charlie Feng. Briefing Over the years, McAfee researchers have observed that certain new top-level Domains...
Examining Code Reuse Reveals Undiscovered Links Among North Korea’s Malware Families
Attacks from the online groups Lazarus, Silent Chollima, Group 123, Hidden Cobra, DarkSeoul, Blockbuster, Operation Troy, and 10 Days of Rain are believed to have come from North Korea. But how can we know with certainty?
Evolving Security Products for the new Realities of Living Life From Home
Announcing McAfee’s Enhanced Consumer Security for New Consumer Realities With millions of people continuing to work and study remotely, scammers have...
Evolved IoT Linux Worm Targets Users’ Devices
Since the early ‘90s, Linux has been a cornerstone of computer operating systems. Today, Linux is everywhere — from smartphones...
Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study
Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the...
Evolution of Android Malware: IRCBot Joins the Party
We all know how fast the smart phone market is growing. Along with it, the complexity and the numbers of...
Everything You Need to Know to Keep Your Passwords Secure
How do you manage all those user names and passwords without having a cheat sheet in a file on your computer or stuck on post-it notes next to your computer? Neither option provides the security you should reserve for passwords.
Everything You Need to Know to Avoid a Man-in-the-Middle Mobile Attack
Monkey in the middle, the beloved playground staple, extends beyond schoolyards into corporate networks, home desktops, and personal mobile devices...
Everything You Need to Know About Identity Remediation
There are no ifs, ands, or buts about it: A stolen identity creates a mess. Once they have a few...
Everyone Loves Selfies, Including Malware!
This blog was written by Bruce Snell. I was talking with some of my coworkers the other day about why...
Everyday Hero: 5 Questions with McAfee Labs’ Paula Greve
iWith cybersecurity experts taking center stage this week at the Black Hat conference in Las Vegas, the world is watching...
Every Step You Take, Every Call You Make: Is Your Phone Watching You?
Imagine a world where every mobile move you make – each text message and phone call – is broadcast to...
Every Step You Take, Every Call You Make: Is Your Phone Tracking You?
So, what does your phone know about you? Taken all together it knows plenty — sometimes in ways that feel...
Evasion Techniques: Encoded JavaScript Attacks PDF Files
Last week I kicked off a series of blogs with a discussion of how an effective IPS solution can fight...
Entertainment #FromHome: What to do When You’re Bored at Home
Entertainment #FromHome: What to do when you’re bored at home If your queue of movies and shows are looking...
Entertainment #FromHome: How to start your own podcast
How to start your own podcast Start your own podcast? Why not? Instead of streaming someone else’s show, maybe it’s...
Entertainment #FromHome: Photo Backups, Digital Picture Frames, and More!
Entertainment From Home: Back up your photos, create digital picture frames, and more! One thing many of us have is...
ENS 10.7 Rolls Back the Curtain on Ransomware
Ransomware protection and incident response is a constant battle for IT, security engineers and analysts under normal circumstances, but with...
End the Hate: 10 Ways to Stand Up and Help Stomp Out Bullying
Bullying can cause immense physical and emotional pain, leading to decreased self-esteem, increased anxiety, and even suicide in extreme cases. Given its severe potential consequences, it’s critical for every one of us to take steps to end the hate.
Encrypted Messaging Service Hack Exposes Phone Numbers
Many people opt for encrypted messaging services because they like the additional layers of privacy they offer. They allow users...