From text message spam on smartphones to new malware that hijacks and locks down computers, Internet threats are continually evolving. Learn how the latest online threats operate and the key steps you can take to protect your email, network, and business.
Cybercriminals are targeting social media users’ accounts now more than ever.
This infographic looks at consumer attitudes toward shopping online and outlines how a security breach or the lack of a visible security policy or indicator can change a consumer’s decision to do business on a website, directly impacting an online merchant’s sales conversions.
Malicious attacks — where the only goal is to cause as much damage as possible — are expected to grow in 2013. Here are five key tips for enterprises to help mitigate the impact of these attacks aimed at breaching database and network security.
Whether you are a security professional or simply looking to learn more about online threats, McAfee researchers will guide you through the current threat landscape. Our analysis helps you understand overall threat trends, how malware and Internet threats are evolving, and which devices and payloads cybercriminals are targeting — key insights that can help you protect your business.
This infographic highlights key findings of the McAfee Labs Threats Report: June 2014, including how thieves take advantage of popular apps to infiltrate mobile devices and the expected increase in stealthy rootkits.
The cybercrime ecosystem that sells packaged malware makes point-of-sale (POS) breaches against retailers easier than ever for cybercriminals.
A drastic increase of malicious signed binaries has led to a lack of faith in the long-trusted certificate authority (CA) protocol.
The W32/Worm-AAEH family (aliases: Beebone, VObfus, Changeup) of Trojans/downloaders/worms has been notorious for consistently morphing itself and switching control servers since June 2009. In June 2013, the AAEH worm made its biggest cosmetic change since 2009 by packaging an entire encrypted binary (containing all the malicious W32/Worm-AAEH code) inside its signature cryptor, which previously held only […]
The post W32/Worm-AAEH Replaces Cryptor With One Used by Dofoil Downloaders appeared first on McAfee.
Tips to protect your home computers, mobile devices, and your family’s complete digital life