Consumer Consumer Threat Notices

How To Do A Virus Scan

Whether you think you might have a virus on your computer or devices, or just want to keep them running smoothly, it’s easy to do a virus scan. How you perform the virus scan depends on the software you have, so we’ll go through a few options below. But first, ...

Consumer

Fortnite: Why Kids Love It and What Parents Need to Know

  Fortnite: Battle Royale is the hottest video game for kids right now. More than 125 million people have downloaded the game and it’s estimated that 3.4 million play it monthly. But while the last-man-standing battle game is a blast to play, it also has parents asking a lot of ...

Português

A segurança da informação está em alerta vermelho

Quando ocorreu o ataque do WannaCry, tive interesse em iniciar uma investigação  para saber a sua origem e como o ataque foi desenvolvido. O que encontrei foi que a exploração usada remonta os vazamentos de informações de um grupo hacker que aconteceram no ano passado e neste ano. Foram cinco ...

Español

La seguridad de la información en alerta roja

Cuando tuvo lugar el ataque de WannaCry, me interesé en iniciar una investigación acerca de su origen y de cómo se desarrolló el ataque. Encontré que la explotación usada remonta a las fugas de información de un grupo hacker que sucedieron el año pasado y este año. Los hackers llevaron ...

Enterprise

DNSMessenger Revitalizes Fileless Malware, Uses Queries to Execute Attacks

This blog was written by Brett Kelsey. In early March, Cisco Systems’ Talos security team issued a detailed report on a newly discovered attack called DNSMessenger. The attack makes a skillful use of Windows PowerShell, DNS TXT and Microsoft Word macros to silently infect a victim’s computer without creating files. ...

McAfee Labs

Best practices for preventing Dridex infections

Mitigating the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of McAfee security products. Browse the product guidelines available here (click Knowledge Center, and select Product Documentation from the Support Content list) to mitigate the threats based on the behavior described ...

McAfee Labs Français

Dridex Best Practices

Limiter et protéger votre entreprise contre les attaques de type Dridex peut se faire à différents niveaux d’interception : Fichiers, Registre, URL et IP, et celà à travers plusieurs technologies des gammes de produits McAfee. La protection contre ce type de codes malveillants extrêment volatile nécessite une approche multi niveaux et une ...

Consumer Threat Notices

How Hackers Use Popular Shows to Infect Your Devices

If there’s one reasonable measurement of how popular a television series has become, it’s how often it’s illegally downloaded online. And for HBO’s hit series, Game of Thrones (GoT), episodes are stolen about as often as weddings are ruined in the series. That is to say: all of the time. ...

McAfee Labs

Product Coverage and Mitigation for CVE-2014-1761 (Microsoft Word)

On March 24, Microsoft released Security Advisory 2953095 for Microsoft Word. In-the-wild exploitation of this vulnerability has been observed across limited, targeted attacks. The flaw is a memory-corruption vulnerability that can be invoked when parsing specially crafted RTF files or data. Successful exploitation can give an attacker the ability to ...

Subscribe to McAfee Securing Tomorrow Blogs