Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

Google Play Users Risk a Yellow Card With Android/FoulGoal.A

This blog post was co-written by Irfan Asrar. English soccer fans have enthusiastically enjoyed the team’s current run in the...

McAfee Labs

Organizations Leave Backdoors Open to Cheap Remote Desktop Protocol Attacks

While researching underground hacker marketplaces, the McAfee Advanced Threat Research team has discovered that access linked to security and building automation systems of a major international airport could be bought for only US$10.

McAfee Labs

Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events

Every four years, everyone’s head around the globe turns toward the television. The Olympics, the World Cup – world events like...

McAfee Labs

AsiaHitGroup Returns With New Billing-Fraud Campaign

Are you tired yet of the music track “Despacito”? If you downloaded this ringtone app from Google Play, chances are...

McAfee Labs

AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play

The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on...

McAfee Labs

McAfee Labs Threats Report Features Innovative Attacks, Crypto Mining, Multisector Attacks

In the McAfee Labs Threats Report June 2018, published today, we share investigative research and threat statistics gathered by the McAfee Advanced Threat Research and McAfee Labs teams in Q1 of this year.

Life at McAfee

How I Wear My #McAfeePride

By: Keyeon, Business Development Representative Imagine if you felt like you had to keep a secret from everyone you know,...

McAfee Labs

Apply MITRE’s ‘ATT&CK’ Model to Check Your Defenses

Every week we read about adversaries attacking their targets as part of online criminal campaigns. Information gathering, strategic advantage, and...

McAfee Labs

Unintended Clipboard Paste Function in Windows 10 Leads to Information Leak in RS1

The McAfee Labs Advanced Threat Research team has been investigating the Windows 10 platform. We have submitted several vulnerabilities already...

Life at McAfee

A Field Trip to McAfee’s World of Cyber

By: Amanda Steger, Senior Director & Sandra Chin, Engineering Operations Manager Educating the next generation of cybersecurity heroes has always...

McAfee Labs

Threat Report: Don’t Join Blockchain Revolution Without Ensuring Security

On May 19 researchers discovered a series of vulnerabilities in the blockchain-based EOS platform that can lead to remote control...

McAfee Labs

Want to Break Into a Locked Windows 10 Device? Ask Cortana (CVE-2018-8140)

June’s “Patch Tuesday” (June 12) is here, but it is likely many Windows 10 users have not yet applied these updates.

McAfee Labs

VPNFilter Malware Adds Capabilities to Exploit Endpoints

VPNFilter, a botnet-controlled malware that infects networking devices, was first documented by researchers from Cisco Talos. McAfee Labs also published...

Life at McAfee

My Global Internship Experience

By: Madeleine Human Resources, Intern Picture this: approaching the end of your double degree, applying for internships and work experience...

McAfee Labs

VPNFilter Botnet Targets Networking Devices

VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.

McAfee Labs

It’s a Zoo Out There! Data Analysis of Alleged ZooPark Dump

In early May, researchers disclosed a Mobile malware campaign by a group focused on Middle Eastern targets. This actor was...

Life at McAfee

Global Community Service Day 2018: Together for good

By: Emily, Communications Program Manager When I finished college, I went to work for the same nonprofit youth sports organization...

McAfee Labs

Malware on Google Play Targets North Korean Defectors

Earlier this year, McAfee researchers predicted in the McAfee Mobile Threat Report that we expect the number of targeted attacks on mobile devices to increase due to their ubiquitous growth combined with the sophisticated tactics used by malware authors.

McAfee Labs

Syn/Ack Unique Proactive Protection Technique

McAfee’s Advanced Threat Research team has performed analysis on samples of Syn/Ack ransomware implementing Process Doppelgänging.  For those who are...

McAfee Labs

McAfee Protects Against Doppelgänging Technique

This blog was co-written with Brook Schoenfield. That adversaries adopt new techniques is a known fact. However, the speed they...

McAfee Labs

Global Malware Campaign Pilfers Data from Multiple Industries

McAfee Advanced Threat Research analysts have uncovered a global data reconnaissance campaign assaulting a wide number of industries including critical...

McAfee Labs

Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide

McAfee Advanced Threat Research analysts have uncovered a global data reconnaissance campaign assaulting a wide number of industries including critical...

McAfee Labs

Despite Decline in Use of Adobe Flash, Vulnerabilities Will Continue to Cause Concern

This post was researched and written by Brook Schoenfield with the assistance of Tim Hux, Abhishek Karnik, Asheer Malhotra, and...

McAfee Labs

Cloud Clustering Vulnerable to Attacks

The authors thank John Fokker and Marcelo CaroVargas for their contributions and insights. In our upcoming talk at the Cloud...

McAfee Labs

Parasitic Coin Mining Creates Wealth, Destroys Systems

The increasing popularity of cryptocurrencies has inspired some people to pursue coin mining, essentially making money online. (Mining is the...

McAfee Labs

Today’s Connected Cars Vulnerable to Hacking, Malware

The McAfee Advanced Threat Research team recently published an article about threats to automobiles on the French site JournalAuto.com. Connected cars are growing rapidly in number and represent the next big step in personal transportation.

McAfee Labs

Ransomware Takes Open-Source Path, Encrypts With GNU Privacy Guard

McAfee Labs has recently observed a new variant of ransomware that relies on the open-source program GNU Privacy Guard (GnuPG)...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top