Featured Blogs
Unintended Clipboard Paste Function in Windows 10 Leads to Information Leak in RS1
The McAfee Labs Advanced Threat Research team has been investigating the Windows 10 platform. We have submitted several vulnerabilities already...
Unmasking AI and the Future of Us: Five Takeaways from the Oprah TV Special
In a recent special hosted by Oprah Winfrey titled “AI and the Future of Us”, some of the biggest names...
Unmasking AsyncRAT New Infection Chain
Authored by Lakshya Mathur & Vignesh Dhatchanamoorthy AsyncRAT, short for “Asynchronous Remote Access Trojan,” is a sophisticated piece of malware...
Unplugging: How Small Tech Shifts Can Make a Big Impact on a Family Vacation
The smartphone is the one item that automatically ignites an inner struggle as we pack for that long-awaited family vacation....
Unregulated at Any Speed: DoT’s Cybersecurity Policy for Self-Driving Cars
Despite headlines, hype, and hysteria, US government rightly chooses cybersecurity guidance over regulation. The Obama administration today unveiled its long-awaited...
Unsecured IoT Devices Behind Last Week’s DDoS Attack, More Likely to Come
A hyper-connected world offers a lot of benefits, but it also comes with a lot of risk. President Obama has...
Unsubscribing From Unwanted Email Carries Risks
We all receive loads of unwanted email solicitations, warnings, and advertisements. The number can be overwhelming to the point...
Unwanted Guests at Trump Hotels: Malware and Credit Card Fraud
Hotels go to great lengths to be your home away from home. Therefore, the last thing they, and you, want...
Unwrapping Some of the Holiday Season’s Biggest Scams
Even with the holidays in full swing, scammers won’t let up. In fact, it’s high time for some of their...
Update on the Beebone Botnet Takedown
On April 8, the takedown operation for the polymorphic botnet known as Beebone successfully concluded. This action redirected traffic from...
Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets
Charles Strite, according to Lemelson-MIT, first introduced the modern toaster in 1926. It was, and remains to this day, a...
Update: NGRBot Posing as Skype Drops Ransomware With Fake McAfee Logo
This blog was updated on October 15. See the end of this file. We recently received a sample of the...
Updated BlackEnergy Trojan Grows More Powerful
In late December, a cyberattack caused a power outage in the Ukraine, plunging hundreds of thousands of citizens into darkness...
Updates and Mitigation to Microsoft Office Zero-Day Threat (CVE-2013-3906)
On November 5, Microsoft posted Security Advisory 2896666. This vulnerability, discovered by Haifei Li of McAfee Labs, affects multiple versions of Microsoft...
Urgent! Update Your Apple Devices Now
This blog was written by Bruce Snell. A number of serious vulnerabilities have been recently reported impacting OS X, iOS,...
US-B Careful: Public iPhone Chargers Lie in Wait
It is common knowledge that connecting your devices to public Wi-Fi can expose them to potential malware and other security risks. But have you ever considered the dangers that might be lurking within public USB chargers?
USB Drives – Protecting Your Humble Workhorse from Malware and Loss
The humble USB drive—the workhorse of students, professionals, and everyday computer users. No wonder hackers put USB drives in their...
USB Drives – With Convenience Comes Risk
I’m sure most of us have used a USB drive (or thumb drive) at one point or another. They are...
Use an Airport App to Catch a Flight, Not a Bug
Traveling is supposed to be a break from reality, but that doesn’t mean it’s a breeze. First your Uber driver...
User Data from 23andMe Leaked Online – What Users Should Do, and the Rest of Us Too
In October, a hacker claimed to have hijacked profile information of “millions” of users from the popular genetic testing site...
Using Expert Rules in ENS to Prevent Malicious Exploits
Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention. Learn more about which threats they can help block.
Using the Internet as a Medium For Women To Break The Glass Ceiling
“You know, the internet has done wonders for my business,” said a lady baker to me, beaming at all the...
Vacation Checklist: 5 Easy Ways to Help Secure Your Family’s Devices When Traveling
With this writing, we’re joyfully en route to a much-anticipated Florida vacation. A sneak peek into our car — and...
Valentine’s Alert: Don’t Let Scammers Break Your Heart or Your Bank Account
As with any major holiday or special occasion, Valentine’s Day is unfortunately not immune to scammers looking for an opportunity to exploit unsuspecting individuals. In this article, we spotlight some common Valentine’s Day scams, offer tips on how to protect yourself and navigate this romantic day with confidence and caution.
Vampire Wifi: How Public Wi-Fi Traps Travelers in Cyber Attacks
They’re not hiding in dark alleys—they’re hiding in plain sight. Airports, cafés, hotels, even libraries can harbor dangerous Vampire Wi-Fi...
Variant of Pony Botnet Pickpockets Bitcoin Users
Last month the Pony Botnet became a household name when it was revealed that it had stolen more than two...
VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials
Since the beginning of the year we have seen a spike in ransomware including the emergence of new ransomware families....
