Skip to main content

Vulnerability Issues Found in All Mcafee Antivirus Products

 McAfee antivirus is regarded as one of the most effective internet security suites and used by millions of individuals in their computers. However, researchers have found a security big in all editions of McAfee antivirus that can be used by hackers to harm the systems of the victims. The fact that no denial has come forward from McAfee antivirus support team confirms the serious nature of this security bug.

Cyber security team of researchers at SafeBreah Labs shocked the world on Tuesday when it said that defense mechanisms of McAfee antivirus products can be bypassed by a security bug called CVE-2019-3648. Once the system’s security has been compromised, it becomes easy for hackers to carry out further attacks to take control of the system.

Realizing the gravity of the situation, developers at McAfee swung into action and released a patch to fix this security bug. This security flaw was brought to the notice of researchers at McAfee in August 2019. It was clear that this bug was affecting all antivirus programs made by the company namely MIS, AVP, and MTP. Engineers at McAfee, even though they acknowledged the problem, termed this security flaw as a medium level vulnerability.

McAfee antivirus support worked hard upon the problem and came up with a solution that they said would fix the vulnerability if all McAfee products. This patch is being referred to as 16.0.R22 Refresh 1. If you are using a McAfee antivirus in your computer, you are advised to download this patch to ensure safety and security of your system.

Recently, another major antivirus maker Avast faced a similar situation where it was told about a security flaw that could be breached by hackers easily. The company not only released a patch but also gave the researcher a cash reward of $5000.

Hackers could gain access to the system of the victim because of this security flaw that gave them administrator privileges. Once this permission rests with the hacker, it is possible for him to take control of the system without much effort.

Researchers at SafeBreach Labs have clearly explained three ways in which the security flaw in McAfee antivirus can be exploited by hackers. Attackers can load and execute malicious payloads to breach the security of the victim’s system. The three main McAfee products that are being used by customers around the country are McAfee Total Protection (MTP), McAfee Internet Security (MIS), and McAfee Antivirus Plus (AVP). Users of all three products have reported that their systems have been impacted because of the presence of a security flaw.

McAfee antivirus support team has said that customers need not worry about the safety and security of their files or systems. The company has released a patch in the form of software that these customers can download and install in their computers. Interestingly, there has been no instance of a McAfee guarded system having been attacked and destroyed by hackers using this security flaw in the last few months. Ostensibly, the problem has been resolved by the engineers in McAfee.

more information: aim mail

Comments

Popular posts from this blog

How Can We Control the Spread of Covid-19?

 Covid-19 is a pandemic that has engulfed the whole world in its grip at present. Simply referred to as Corona virus, it is a deadly respiratory infection that causes several symptoms in the victim that usually appear after 2-14 days of catching the infection. These symptoms are dry cough, fever, shortness of breath, body aches, and fatigue. In many patients, Corona virus remains asymptomatic which means that they do not exhibit any of the symptoms associated with the virus and yet serve as deadly carriers of the virus for the rest of the population. How does Corona virus spread? Corona virus is a highly infectious disease that can be easily spread by an infected individual through coughing or sneezing. The droplets coming out of the mouth and nose of the infected individual can easily infect other people coming in his contact. Also, these droplets containing virus can remain active for hours on various surfaces and infect others who touch them.  Prevention is the only cure The worl

Officejet Pro 9015e: Efficient All in One Printer From Hp

 Apple and Samsung have been working on unique foldable smartphones for a very long time. From the side of Apple, rumours are doing rounds that the company will introduce its foldable iPhone sometime in 2022. Apple has fallen behind in this race of concept design as Motorola and Samsung have already released their foldable concept smartphones. It is therefore only natural for loyal customers of Apple to get at least inside news on the progress achieved by the company on this front.  Apple support  has kept mum on foldable iPhone until now. It is only the reports from reliable designers that are credible sources of information for Apple fans. On the basis of these leaks published in the form of sketches and photos, it can be said that Apple is probably working on a flip design for its foldable iPhone slated to debut in 2022. Imagine having a small iPhone that you open and the screen gets divided into two halves with the upper half carrying the clock and the lower half carrying the home

Malwarebytes Slams Apple for the Poor Quality Patching Process

 Malwarebytes has emerged as one of the most popular antivirus systems around the world in recent times. This is when Malwarebytes does not fulfill the requirements to be labeled as fully-fledged antivirus. Recently, the company surprised everyone by complaining against Apple, one of the biggest tech companies in the world. In a blog post written by  Malwarebytes support , the company criticized the patching process of Apple saying it can have serious repercussions for the safety and security of the systems being used by the customers. Thomas Reid, Mac and mobile director in Malwarebytes, wrote a blog post that centers on a campaign called Watering Hole being run in Hong Kong. Watering Hole is actually a security threat that was aimed at the users of Mac OS who were directing people to a pro-democracy event supported by a political organization. TAG from Google first reported about Watering Hole some time ago. Hackers made use of two vulnerabilities in the Mac OS to launch these attac