Featured Blogs
Combating Malware and Advanced Persistent Threats
In the past decade, the security industry has seen a constant rise in the volume of malware and attacks associated...
Coming Home To Vote for Marriage Equality
By Chris, Localization Engineer Chris is a localization engineer for McAfee in Cork, Ireland, who is passionate about inclusivity for...
Configuring McAfee ENS and VSE to Prevent Macroless Code Execution in Office Apps
Microsoft Office macros are a popular method of distributing malware. Users can defend themselves against macro attacks by disabling macros....
Conquering Fear at McAfee
By Radhika, Director of Global Consumer Product Marketing. With the U.S. school year beginning, I’ve been in touch with the...
Convergence and the Future of Cyber Security
CSE 2016 Future of Cyber Security by Matthew Rosenquist from Matthew Rosenquist The security industry is changing. Technology innovation is...
COVID-19 – Malware Makes Hay During a Pandemic
Special thanks to Prajwala Rao, Oliver Devane, Shannon Cole, Ankit Goel and members of Malware Research for their contribution and...
COVID-19 Threat Update – now includes Blood for Sale
Although the use of global events as a vehicle to drive digital crime is hardly surprising, the current outbreak of...
Cracked Software or Cyber Trap? The Rising Danger of AsyncRAT Malware
Authored by Neil Tyagi In cybersecurity, threats constantly evolve, and new ways to exploit unsuspecting users are being found. One...
Creating a Custom Domain Name with a Google App Engine Application
Google’s App Engine is a Platform as a Service (PaaS) for developers that provides features and frameworks to quickly and...
Criminals are Getting Excited for Tax Filing Season
Cybercriminals are plotting to take advantage of tax season, by fraudulently impersonating consumers and scamming Americans. For the citizens...
Critical Office Zero-Day Attacks Detected in the Wild
At McAfee, we have put significant efforts in hunting attacks such as advanced persistent threats and “zero days.” Yesterday, we...
Crypto Scam: SpaceX Tokens for Sale
Authored by: Neil Tyagi Scam artists know no bounds—and that also applies to stealing your cryptocurrency. Crypto scams are like...
Crypto Scammers Exploit: Elon Musk Speaks on Cryptocurrency
By Oliver Devane Update: In the past 24 hours (from time of publication) McAfee has identified 15 more scam sites...
Cryptocurrencies a Target for Cybercriminals, Part 1: the Risks of Innovation
All cryptocurrencies are a target for cybercriminals. Anywhere there is value, criminals, fraudsters, and charlatans will soon follow. Call it...
Cryptocurrencies a Target for Cybercriminals, Part 2: Social Platforms Come Next
One target of cybercriminals is cryptocurrencies, which hold tremendous wealth but are largely anonymous. This limits the attack surface mostly...
Cryptocurrency Laundering Service, BestMixer.io, Taken Down by Law Enforcement
A much overlooked but essential part in financially motivated (cyber)crime is making sure that the origins of criminal funds are...
CryptoWall Ransomware Built With RC4 Bricks
Last month many Internet users were suddenly forced to trade in Bitcoins. This was not for general purposes–they were paying...
CryptoWall V3 and V4 Protection for McAfee Customers
Updated, November 6: Since October 30, the release date of the Cyber Threat Alliance report on CryptoWall Version 3, we...