Featured Blogs
Does Your Teen Recognize the Cruelty of Subtweeting?
“No way! Do you think this tweet is about me?” The abruptly frantic teen held her phone directly up in...
Threat Actors Employ COM Technology in Shellcode to Evade Detection
COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...
Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript
This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni. During the last couple of weeks,...
Cybercriminals Crack into 360 Million Old Myspace Accounts
It’s easy to create online accounts, and it’s just as easy to forget them. Remember Myspace? The early social media...
Trillium Exploit Kit Update Offers ‘Security Tips’
McAfee Labs has previously blogged about the Trillium Exploit Kit Version 3.0, which is commonly used to create and distribute malware....
How ransomware attacks will soar with the growth of IoT
This blog post was written by Nick Viney. Last month I wrote about the rise of ransomware, a particularly nasty...
Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes
If there’s one reason why classic James Bond films are so widely enjoyed, it’s because of the unbeatable gadgets. From...
Android Spyware Targets Security Job Seekers in Saudi Arabia
The Middle East is the new Wild West of mobile malware, especially for targeted attacks and intelligence gathering campaigns. During...
Don’t Let Hackers Sink Your Family Vacation Plans
Planning a family vacation has evolved to an art form. There’s an app for everything from booking flights, discovering deals,...
Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes
This blog post was written by Kalpesh Mantri. Darkleech is an Apache module on the dark web that distributes malware....