Featured Blogs
Fake WannaCry ‘Protectors’ Emerge on Google Play
Are Android devices affected by the self-propagating ransomware WannaCry? No—because this threat exploits a vulnerability in Microsoft Windows. This malware...
Fake-Alert Scams Growing Again
Fake-alert Trojans, also known as scareware, fool consumers by claiming imaginary threats, and insisting its victims purchase a product to...
Fakecalls Android Malware Abuses Legitimate Signing Key
Authored by Dexter Shin McAfee Mobile Research Team found an Android banking trojan signed with a key used by legitimate...
Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims
Alexandr Solad and Daniel Hatheway of Recorded Future are coauthors of this post. Read Recorded Future’s version of this analysis. ...
Farewell to the SHA-1 Hash Algorithm
Rest in peace SHA-1. Like all security controls, they are valuable only for a certain time. SHA-1, a legacy hashing...
Fighting Mobile Phone Impersonation and Surveillance
Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased...
Fighting new Ransomware Techniques with McAfee’s Latest Innovations
In 2021 ransomware attacks have been dominant among the bigger cyber security stories. Hence, I was not surprised to see...
File-Hosting Site Turns Your File Into Adware
We recently received a sample from a customer and upon initial analysis it looked like a bundled software installer. Upon...
First 30 Days at McAfee: Pups at Work, VR and Pledge Wall
By Beth, HR Communication Specialist in Plano, Texas. For the last six consecutive years, The Dallas Morning News has recognized...
Five Tips from McAfee’s Remote Workers
Whether you’re working from for the first time or a remote working veteran, you may be looking for some tips...
Floki Bot a Sensation With International Cybercriminals
Floki Bot, new financial malware, is popular with English-, Portuguese-, and Russian-speaking underground criminal markets, winning over cybercriminals with new...
For some, accounting is more than just spreadsheets! Vernon’s McAfee Journey
Vernon has been our Manager of Technical Accounting for more than two years, but that doesn’t mean he’s busy with...
Fraudulent Adult Dating Services Turn 10 Years Old, Still Evolving
McAfee Mobile Research monitors adult one-click-fraud applications on Google Play that are targeted at Japanese users. Although the attackers appeared...
Free Ransomware Available on Dark Web
The McAfee Advanced Threat Research team recently analyzed a ransomware-as-a-service threat that is available for free and without registration. This malware...
French Magazine Suffers Web Hack, Firebombing
To celebrate the recent victory of the Tunisian Islamist party, the French satirical magazine “Charlie Hebdo” published a special issue...
From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta
Management. Control. It seems that you can’t stick five people in a room together without one of them trying to...
From Email to RAT: Deciphering a VB Script-Driven Campaign
Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized by obfuscated Visual...
From Military Kid to Product Marketing: My McAfee Journey
Employee Spotlight: Meet Jovohn! From military beginnings to mobile security champion, meet Jovohn, our passionate Product Marketer and MAHC President....