Featured Blogs
Server-Side Request Forgery Takes Advantage of Vulnerable App Servers
This blog was written by Kunal Garg. Server-side request forgery is an attack in which an attacker can force a...
Service Provider [24]7.ai Breached, Leaked Customer Data from Delta Airlines, Sears, Kmart
A huge part of modern-day customer service is the chat functionality, which allows customers to converse easily with representatives of...
Setting the Stage for Your Video Interview: Job Hunting From Home
If you’ve lined up your first video interview, or just new to the whole idea in general, how do you...
Setting Up HTTPS for Google App Engine Applications
Thursday, we posted advice on creating a custom domain name for an application developed with Google’s App Engine. In this...
Setting Up Parental Controls in TikTok, Instagram & Snapchat
It’s a question we get a lot from parents: “How can I keep my kids safe when they are constantly...
Seven Android Apps Infected With Adware, Downloaded Over 500,000 Times
The amount we use our apps and the amount of apps we use has shown no signs of slowing. And...
Seven Windows Wonders – Critical Vulnerabilities in DNS Dynamic Updates
Overview For the March 2021 Patch Tuesday, Microsoft released a set of seven DNS vulnerabilities. Five of the vulnerabilities are...
Sex Sells: Looking at Android Adult Adware Apps
Advertising is one of the primary methods to generate money from mobile devices. Ads can be displayed in the browser...
Sextortion – What Every Parent Needs To Know
Imagine this. You’re 15, feeling unsure about yourself in the world, possibly even a little lonely. One day, a pretty...
Sextortion: What Your Kids Need to Know
Sextortion is a nightmare scenario no parent wants to contemplate, yet recent FBI reports indicate a distressing rise in cases...
Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems
Last week the McAfee Advanced Threat Research team posted an analysis of a new wave of Shamoon “wiper” malware attacks...
Shamoon Rebooted in Middle East, Part 2
Last week we provided some initial analysis on recent attacks targeting organizations in the Middle East. The attack has hallmarks...
Shamoon Rebooted?
We have recently received notifications and samples from impacted organizations in the Middle East that have hallmarks of the Shamoon...
Shamoon Returns to Wipe Systems in Middle East, Europe
Destructive malware has been employed by adversaries for years. Usually such attacks are carefully targeted and can be motivated by...
Share Kids Images Safely
Kids images online. I’m not a big sharer online but I do love popping up a few pics of an...
Share Your Heart, Not Your Identity: Here’s How You Can Stay Safe on Valentine’s Day
I love Valentine’s day, it’s the one day of the year exclusively dedicated to sharing: we share our feelings, our...
Sharing Cybersecurity Threat Intelligence Is the Only Way We Win
Cybersecurity is a team sport. The bad guys share information, expertise, and code as they help one another. The good...
Sharing Isn’t Always Caring: 3 Tips to Help Protect Your Online Privacy
It’s 2019 and technology is becoming more sophisticated and prevalent than ever. With more technology comes greater connectivity. In fact,...
Shielding Against Android Phishing in Indian Banking
Authored by Neil Tyagi and Fernando Ruiz In a digitally evolving world, the convenience of banking through mobile applications has...
ShinyHunters Exposes Over 125 Million Online Credentials
ShinyHunters Exposes Over 125 Million Online Credentials Meet ShinyHunters, a hacker who recently leaked 10 new databases this past month...
Shiva’s Tragic Accident Turns into a Story of Resilience
My McAfee Chronicles is a series featuring McAfee team members who have interesting and inspiring life stories to share. Meet Shiva, a...
Shop till You’re Hacked? 3 Tips to Stay Secure this Holiday Season
With just days until Black Friday, the unofficial kick off to the holiday shopping season is quickly approaching. In anticipation...
Shopaholics: Beware of Risky Wi-Fi
As the days grow shorter and twinkly lights pop up on houses lining the block, one thing is clear: the...
Short-URL Services May Hide Threats
Short-URL services have emerged as a crucial part of the way we use the Internet. With the increasing use of...
Should I Worry About AVGater, Which Exploits Some Security Products?
This blog was written by Brook Schoenfield. On November 10, a researcher reported the vulnerability AVGater, which affects some antimalware...
Should Stickam Be Blocked From Your Child?
Webcams have always been an area of concern for parents with online kids. Webcams can affect the safety and privacy...
Should You Post Pics of Your Kids? Insights From Our Age of Consent Survey
If you use social media, you love posting pictures of your life and all the people in it. More often...