11 Easy Ways to Start Reclaiming Your Family’s Vanishing Privacy
Every day search engines collect our data, companies sell our information, prying algorithms stalk our clicks and our cell phones and apps spy on us in a new and concerning ways. Relationship Status: It’s Complicated We’re in a privacy conundrum with our tech: We hate it, but we love it; we wanna toss it, but […] more…EMOTET Returns, Starts Spreading via Spam Botnet
We first detected the banking malware EMOTET back in 2014, we looked into the banking malware’s routines and behaviors and took note of its information stealing abilities via network sniffing. After a period of relative inactivity, it appears it’s making a comeback with increased activity from new variants (Detected by Trend Micro as TSPY_EMOTET.AUSJLA, TSPY_EMOTET.SMD3, […] more…CVE-2017-0780: Denial-of-Service Vulnerability can Crash Android Messages App
by Jason Gu and Seven Shen Just about anyone can appreciate a good old meme GIF every now and then, but what if one caused your Android Messages to crash? A denial-of-service vulnerability we recently disclosed to Google can do exactly that and more. Designated as CVE-2017-0780, we’ve confirmed it to be in the latest […] more…Android Mobile Ransomware: Bigger, Badder, Better?
By Lorin Wu (Mobile Threat Analyst) The mobile threat landscape isn’t just rife with information stealers and rooting malware. There’s also mobile ransomware. While it seems they’re not as mature as their desktop counterparts, what with the likes of WannaCry and Petya, the increasing usage of mobile devices, particularly by businesses, will naturally draw more […] more…Android Banking Trojan MoqHao Spreading via SMS Phishing in South Korea
Last month, a number of users started posting on South Korean sites screenshots of suspicious SMS messages phishing texts (also known as smishing) to lure them into clicking on shortened URLs. For example, the following message asks the user to click on the link to check if a private picture has been leaked: Figure 1: […] more…Sarahah, honesty and making sure your kids aren’t part of the problem
Freedom of speech in written texts? Totally anonymous? No fear of being identified and penalized? Whoa, that’s what GenY was waiting for! And youngsters have been, going for it I mean, by the drove! If you are still wondering what I am talking about, it’s the new app Sarahah, that’s got everyone’s attention. The brainchild […] more…Time to Close vs. Root Cause – Are we measuring the wrong thing (again)?
“Human beings adjust behavior based on the metrics they’re held against. Anything you measure will impel a person to optimize his score on that metric. What you measure is what you’ll get. Period.” – Dan Ariely, Duke University behavioral economist in Harvard Business Review When the Verizon Data Breach Investigation Report started reporting “time to” metrics […] more…Cryptocurrency Miner Uses WMI and EternalBlue To Spread Filelessly
By Buddy Tancio Fileless malware can be a difficult threat to analyze and detect. It shouldn’t be a surprise that an increasing number of new malware threats are fileless, as threat actors use this technique to make both detection and forensic investigation more difficult. We recently found a new cryptocurrency miner (which we detect as TROJ64_COINMINER.QO) […] more…SonicSpy Malware Snoops on Google Play Users via Messaging Apps
Whether it’s a British spy sneaking around a casino, or a cybercriminal looking around your device, all spies snoop to find out information. In fact, a specific type of malware exists solely to spy on and collect innocent users’ data. It’s called spyware, and it’s done some serious damage in the past. Now, a new […] more…McAfee Survey: Parental Input on Tech Safety Declines as Kids Get Older
It’s natural for parents to gradually extend a child more freedom and responsibility as that child matures. Finding the magic formula of how much to hang on and how much to let go and in what areas is the holy grail of parenting tween or teenager. A recent McAfee survey echoed this dilemma when it comes […] more…Smishing Campaign Steals Banking Credentials in U.S.
The McAfee Mobile Research team recently found an active smishing campaign, using SMS messages, that targets online banking users in the United States. The messages attempt to scare victims with a notice that the bank account will be soon closed and that the user must immediately click a malicious URL: Figure 1: Phishing SMS message. […] more…3 Reasons You Need a Personal VPN
It used to be the case that only businesses used virtual private networks (VPNs) to connect securely to the internet and keep their private data safe. But these days, with the rapid growth of online threats and privacy concerns, even the casual internet user should seriously consider using a VPN. If you are not familiar […] more…New Details on HBO Attack Emerge, “Game of Thrones” Actors’ Personal Data Leaked
Cybercriminals continue to send their regards to HBO, as their threats have turned into a stark reality. First, they teased stolen scripts and episodes from HBO shows via email, then on their own site named WinterLeak. And now, they’re taking action and making demands, unleashing full “Game of Thrones” scripts and leaking the personal info […] more…Blue Whale Challenge – What You Need To Know And Do!
Parents are waking up to this new online threat to their kids: ‘The Blue Whale Challenge’ which in extreme steps leads children to commit suicide. Fingers are flying fast on WhatsApp, Facebook and Twitter sharing ‘facts’ about the challenge, tips about mentoring kids, and opinions of experts that are adding to the confusion. “What is […] more…Connected Cars: How One Vulnerability Can Turn Cybercriminals into Backseat Drivers
Whether it’s turning the music up a little, or turning down the AC – when you’re in your own car, you’re the driver in all senses of the word. Well, usually. Now, with the recent boom in connected cars, cybercriminals may soon be a backseat driver, only they’re not executing commands from the back row. […] more…New Surveillance Malware “FruitFly” Is a Nearly Undetectable Mac Backdoor
Charles McFarland contributed to this blog Mac malware outbreaks used to be viewed as a rarity. However, the last few years have seen Mac-focused threats steadily on the rise. In fact, our McAfee Labs Quarterly Threats Report showed instances of Mac malware growing by a huge 744% in 2016. Fast forward to the summer of […] more…More information
- Apple Warns of New Zero-Day Attacks on iOS, MacOS
- More secure app-store for Android
- France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine
- How to make Apple’s Mail deliver more productivity
- Facebook tracks all site vistors, violating EU law, report says
- Juniper vs. Palo Alto Networks: Firewall court battle set to begin
- Samsung announces the Galaxy S9 launch, teases “reimagined” camera
- CISA: Oracle Vulnerabilities From ‘Miracle Exploit’ Targeted in Attacks
- Myanmar’s Internet Shutdown Is an Act of ‘Vast Self-Harm’
- Google publishes national security letters for the first time