Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

Fake Android Update Delivers SMS, Click Fraud in Europe

McAfee Mobile Research has been monitoring a mobile malware campaign targeting users in Germany, France, and Russia since the beginning...

Mobile Security McAfee Labs

Fake Bahrain Government Android App Steals Personal Data Used for Financial Fraud

Authored by Dexter Shin Many government agencies provide their services online for the convenience of their citizens. Also, if this...

McAfee Labs

Fake Cleaning Apps in Google Play: an AutoRun Attack and More

Almost exactly one year ago, Google announced the addition of a “new layer to Android security,” a service codenamed Bouncer...

McAfee Labs

Fake Security App Found Abuses Japanese Payment System

Authored by SangRyol Ryu and Yukihiro Okutomi  McAfee’s Mobile Research team recently analyzed new malware targeting mobile payment users in...

Internet Security McAfee Labs

Fake Toll Road Scam Texts are Everywhere. These Cities are The Most Targeted.

Look both ways for a new form of scam that’s on the rise, especially if you live in Dallas, Atlanta,...

McAfee Labs

Fake WannaCry ‘Protectors’ Emerge on Google Play

Are Android devices affected by the self-propagating ransomware WannaCry? No—because this threat exploits a vulnerability in Microsoft Windows. This malware...

McAfee Labs

Fake-Alert Scams Growing Again

Fake-alert Trojans, also known as scareware, fool consumers by claiming imaginary threats, and insisting its victims purchase a product to...

Mobile Security McAfee Labs

Fakecalls Android Malware Abuses Legitimate Signing Key

Authored by Dexter Shin  McAfee Mobile Research Team found an Android banking trojan signed with a key used by legitimate...

McAfee Labs

Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims

Alexandr Solad and Daniel Hatheway of Recorded Future are coauthors of this post. Read Recorded Future’s version of this analysis. ...

McAfee Labs

Farewell to the SHA-1 Hash Algorithm

Rest in peace SHA-1. Like all security controls, they are valuable only for a certain time. SHA-1, a legacy hashing...

McAfee Labs

Fighting Mobile Phone Impersonation and Surveillance

Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased...

McAfee Labs

Fighting new Ransomware Techniques with McAfee’s Latest Innovations

In 2021 ransomware attacks have been dominant among the bigger cyber security stories. Hence, I was not surprised to see...

McAfee Labs

File-Hosting Site Turns Your File Into Adware

We recently received a sample from a customer and upon initial analysis it looked like a bundled software installer. Upon...

Life at McAfee

First 30 Days at McAfee: Pups at Work, VR and Pledge Wall

By Beth, HR Communication Specialist in Plano, Texas. For the last six consecutive years, The Dallas Morning News has recognized...

McAfee News Life at McAfee

Five Tips from McAfee’s Remote Workers

Whether you’re working from for the first time or a remote working veteran, you may be looking for some tips...

McAfee Labs

Floki Bot a Sensation With International Cybercriminals

Floki Bot, new financial malware, is popular with English-, Portuguese-, and Russian-speaking underground criminal markets, winning over cybercriminals with new...

Life at McAfee

For some, accounting is more than just spreadsheets! Vernon’s McAfee Journey

Vernon has been our Manager of Technical Accounting for more than two years, but that doesn’t mean he’s busy with...

Mobile Security McAfee Labs

Fraudulent Adult Dating Services Turn 10 Years Old, Still Evolving

McAfee Mobile Research monitors adult one-click-fraud applications on Google Play that are targeted at Japanese users. Although the attackers appeared...

McAfee Labs

Free Ransomware Available on Dark Web

The McAfee Advanced Threat Research team recently analyzed a ransomware-as-a-service threat that is available for free and without registration. This malware...

McAfee Labs

French Magazine Suffers Web Hack, Firebombing

To celebrate the recent victory of the Tunisian Islamist party, the French satirical magazine “Charlie Hebdo” published a special issue...

McAfee Labs

From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta

Management. Control. It seems that you can’t stick five people in a room together without one of them trying to...

McAfee Labs

From Email to RAT: Deciphering a VB Script-Driven Campaign

Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized by obfuscated Visual...

Life at McAfee

From Military Kid to Product Marketing: My McAfee Journey

Employee Spotlight: Meet Jovohn! From military beginnings to mobile security champion, meet Jovohn, our passionate Product Marketer and MAHC President....

McAfee Labs

From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats

Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as “Asynchronous Remote Access Trojan,” represents a highly sophisticated malware...

Life at McAfee

From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee

From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee March is Women’s History Month and International...

McAfee Labs

Further Analysis of WannaCry Ransomware

McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its...

McAfee Labs

Fuzzing ImageMagick and Digging Deeper into CVE-2020-27829

Introduction: ImageMagick is a hugely popular open source software that is used in lot of systems around the world. It...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top