Featured Blogs
MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters
Every year, more and more words are making it into the English dictionary. The next one to make its debut...
Malicious Forums Turn Amateur Hackers Into Cybercriminals
Security researchers are aware of forums that offer downloads of malicious software such as keyloggers and remote access tools. Some inexperienced...
Kik Messenger: The Dangerous App Kids Love
Police recently arrested a Pennsylvania man who drove to Tennessee to meet and have sex with a minor girl he...
Nivdort: Data-Stealing Trojan Arrives via Spam
During the past couple of weeks, McAfee Labs has observed a huge increase in spam related to Nivdort, a malicious file...
Does Anyone Really Care About Mobile Security?
I’ve attended Mobile World Congress a number of times and it is fair to say the concept of the show...
Clever Phishing Attacks Target Google, Yahoo, DHL Customers
Last week McAfee Labs received a phishing page that efficiently uses the CSS format of the Gmail login page and...
What Parents Need to Know about Popular Video, Audio Apps
If you hear laughing, dancing, goofiness, and a lead choreographer barking commands coming from the next room, chances are your...
Ransomware Targets Healthcare Sector
When we develop threats predictions at McAfee, I personally like to conduct some proper research and base my statements on...
HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit
McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the Angler...
IoT and Privacy: Keeping Secrets from your Webcam
This blog post was written by Bruce Snell. Have you ever put your kids to bed only to have them...