Featured Blogs
Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events
Every four years, everyone’s head around the globe turns toward the television. The Olympics, the World Cup – world events like...
Cybercrime ‘Highlights’ of First Quarter 2014
As a supplement to the next McAfee Labs Threats Report, which will appear next month, we offer this timeline of...
Cybercasing – How Sharing Your Pics, Videos and Status Updates Can Get You Into Trouble
It can be fun ‘checking in’ at your favourite restaurant on Facebook, sharing pics of your hotel room on Instagram...
Cyberbullying’s Impact on Both Society and Security
More than half of children say that a cyberbully targeted them online. That disquieting stat comes from our recent global...
Cyberbullying: Words do Hurt When it Comes to Social Media
Most parents may find it difficult to relate to today’s form of cyberbullying. That’s because, for many of us, bullying...
Cyber Threat Alliance Releases Analysis of Illicit Cryptocurrency Mining
In response to the explosive increase in cryptomining campaigns in Q4 2017, the Cyber Threat Alliance has formed a cryptomining subcommittee to assess the threat.
Cyber Pranks – Funny or Mean??
We all know that kids love to play pranks – it is just part of childhood. Whether it is whoopee...
Cyber Parenting – Let’s Hear What Mothers Have to Say
Children’s Day is around the corner and it has me thinking. With all the brouhaha over a connected future and...
Cyber Monday: Protect Yourself and Your Family from Online Shopping Scams
The eagerly awaited holiday sales such as Black Friday and Cyber Monday are just around the corner. These tips will help you avoid falling prey to online scams, thereby ensuring that you keep your finances safe during this shopping season.
Cyber Insurance – The Need of the Hour
Years ago, when we were complete newbies to computers, data loss was a frequent occurrence. Files were lost as they...
Cyber Criminals Gain in Sophistication With Integrity Attacks
One constant in cybersecurity is the continual rise of sophistication and creativity of attackers. In 2016, we will see a...
CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server
CVSS Score: 9.8 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Overview Microsoft released a patch today for a critical vulnerability (CVE-2020-17051) in the Windows NFSv3 (Network File System) server. NFS is typically...
CVE-2020-16898: “Bad Neighbor”
CVE-2020-16898: “Bad Neighbor” CVSS Score: 8.8 Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C Overview Today, Microsoft announced a critical vulnerability in the Windows IPv6 stack,...
CVE-2016-0153: Microsoft Patches Possible OLE Typo
Recently McAfee Labs discovered an interesting bug in Windows’ OLE implementation, which Microsoft patched this week. Now that the patch...
CVE-2016-0018: DLL Planting Leads to a Remote Code Execution Vulnerability
DLL planting, also known as DLL side loading, is a popular attack technique today. If we take a look at...
CVE-2012-0158 Exploit in the Wild
Since last week, we have seen many specially crafted files exploiting CVE-2012-0158, a vulnerability in MSCOMCTL.OCX in Microsoft Office and...
Customer Support Scams Are Popping up in Social Media Ads: How to Stay Secure
Many of us rely on customer support websites for navigating new technology. Whether it’s installing a new piece of software or...
CurveBall – An Unimaginative Pun but a Devastating Bug
Enterprise customers looking for information on defending against Curveball can find information here. 2020 came in with a bang this...
Current Campaign Delivers Hundreds of Thousands of Polymorphic Ransomware
You might have been getting out of bed when attackers started sending hundreds of thousands of fake invoices the morning...
Curbing The Threat Of Fake Accounts
My bubbly teen was so excited the day she found Priyanka Chopra had started following her on Twitter. She was...
CU46, S2R, TBH, Lit: Updated Texting Slang Parents Should Know
You may have noticed your teen using a whole new pack of words when texting and talking these days. It’s...
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II
In our first article we discussed the growing pattern of targeted ransomware attacks where the first infection stage is often...
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I
For many years now I have been working and teaching in the field of digital forensics, malware analysis and threat...
CryptoWall V3 and V4 Protection for McAfee Customers
Updated, November 6: Since October 30, the release date of the Cyber Threat Alliance report on CryptoWall Version 3, we...
CryptoWall Ransomware Built With RC4 Bricks
Last month many Internet users were suddenly forced to trade in Bitcoins. This was not for general purposes–they were paying...
Cryptojacking – Stop Hackers from Making Money Off You
Your pain is their gain. That’s how things go in a cryptojacking attack. Cryptomining is the utilization of computers to...
Cryptojacking Up 4,000% How You Can Block the Bad Guys
Think about it: In the course of your everyday activities — like grocery shopping or riding public transportation — the...