USB Drives – Protecting Your Humble Workhorse from Malware and Loss
The humble USB drive—the workhorse of students, professionals, and everyday computer users. No wonder hackers put USB drives in their...
Peeling Back the Layers of RemcosRat Malware
Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email....
How to Protect Yourself From Tailgating Attacks
Holding the door for someone might open the way to a cyberattack. For anyone who works in a secure building...
How to Avoid Phishing Attacks on Your Smartphones and Computers
Ping, it’s a scammer! The sound of an incoming email, text, or direct message has a way of getting your...
Fakecalls Android Malware Abuses Legitimate Signing Key
Authored by Dexter Shin McAfee Mobile Research Team found an Android banking trojan signed with a key used by legitimate...
What is a Zero-Day Threat?
“Zero-day threat.” It may sound like the title of a hit film, yet it’s anything but. It’s a previously unknown...
The Rising Trend of OneNote Documents for Malware delivery
Authored By Anandeshwar Unnikrishnan,Sakshi Jaiswal,Anuradha M McAfee Labs has recently observed a new Malware campaign which used malicious OneNote documents...
4 Mobile Malware Threats You Can’t Even See
By 2030, experts predict that there will be 5 billion devices connected to 5G.1 For the general population, this connectedness...
How To Prevent Downloading Malicious Software
Malware—the term seems to be at the center of the news every day, with each headline telling of a new...
What Is Smishing and Vishing, and How Do You Protect Yourself?
Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text...