This report includes two distinct views of the future: First, we look forward five years and predict how the cyber threat landscape will change and the security industry’s likely response. Then, we look tactically at 2016 and make specific predictions about expected threat activity.
This is the first published report using combined threat research and intelligence from the Cyber Threat Alliance founding and contributing members, including Intel Security. It provides organizations with valuable insights into the CryptoWall Version 3 lifecycle and current proliferation, as well as tools for prevention and mitigation.
This report details a few of the many ways in which cyber thieves monetize the information they have stolen.
The August 2015 McAfee Labs Threats Report takes a five-year look back at the changes in cybersecurity, analyzes tactics used by attackers to steal data, and examines malware attacks on graphics processing units (GPUs).
For the first time ever, we explore attacks on firmware. We also highlight Adobe Flash exploits that target the growing number of vulnerabilities not patched by users and a surge in powerful new ransomware that encrypts files and holds them hostage until the ransom is paid.
See how Intel Security and a global law enforcement action took down a major botnet that infected over 100,000 systems globally.
This infographic highlights the continuing impact — this time to mobile apps — from several dangerous SSL/TLS vulnerabilities that were exposed in 2014.
Learn about the top security threats of 2015 predicted by McAfee Labs researchers.
The McAfee Labs Threats Report: November 2014 details the far-reaching BERserk vulnerability and explores the various forms of trust abuse.
The McAfee Labs Threats Report: August 2014 details the Heartbleed aftermath, results of the McAfee Phishing Quiz, and the results from Operation Tovar.
A rise in the number of malicious Flappy Bird game clones has increased the risk of mobile device data theft.
As mobile malware attacks become increasingly advanced, users need to implement stronger and smarter security techniques.
A rise in rootkit malware was witnessed during the first quarter of 2014 as hackers have developed advanced methods to penetrate security in 64-bit systems.
Botnet vendors are now selling tools that can be used for virtual currency mining.
The cybercrime ecosystem that sells packaged malware makes point-of-sale (POS) breaches against retailers easier than ever for cybercriminals.
A drastic increase of malicious signed binaries has led to a lack of faith in the long-trusted certificate authority (CA) protocol.
The amount of mobile malware continued to skyrocket in 2013, reaching totals never before seen by researchers. Learn what to be aware of to keep your mobile device and identity safe.
Enterprises are shifting their data to cloud-based applications for convenient, cost-effective storage, but cybercriminals are eagerly waiting to attack visible exploits that are not adequately secured.
The rise and popularity of virtual currencies has also given way to an increase of cybercrime on underground websites.
Android-based malware continues to rise as cybercriminals find new ways to evade security.
Ransomware kits, an emerging cybercrime tool, allow criminals without programming skills to extort payments by holding a system hostage. Ransomware attacks on Windows PCs and mobile devices are expected to continue to grow.
Cybercriminals are developing online sales sites to provide more secure and anonymous transactions to their clients.
Malware shopping spree apps, NFC worms, and update-blocking malware will have a major impact on Android smartphones and tablets, and the overall mobile security landscape, in 2013.
Remote procedure call and browser attacks have overtaken Structured Query Language (SQL) injection attacks, and MySQL brute-force attacks are on the rise.
Connecting old technology to the Internet and relying on embedded systems without focusing on security issues has made the energy grid vulnerable to cyberattacks.
In 2010 Stuxnet, a worm designed to sabotage energy facilities, attacked Iran’s nuclear enrichment facility. Since then, variants of the malware have proliferated with significant implications to the energy infrastructure around the globe.