Other Blogs

[breadcrumb]

Featured Blogs

How To Guides and Tutorials McAfee Labs

How to Stop the Popups

McAfee is tracking an increase in the use of deceptive popups that mislead some users into taking action, while annoying...

McAfee Labs

How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner

Introduction This blog describes how McAfee ATP (Adaptive Threat Protection) rules are used within McAfee Endpoint Security products. It will...

McAfee Labs

How Visiting a Trusted Site Could Infect Your Employees

The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple...

Life at McAfee

How we’re #InspiringInclusion at McAfee for International Women’s Day 2024

International Women’s Day 2024’s theme, #InspireInclusion, reminds us that genuine change requires going beyond individual actions. It’s about fostering an...

McAfee Labs

Hunting for Blues – the WSL Plan 9 Protocol BSOD

Windows Subsystem for Linux Plan 9 Protocol Research Overview This is the final blog in the McAfee research series trilogy...

McAfee Labs

HVACking: Understanding the Delta Between Security and Reality

The McAfee Labs Advanced Threat Research team is committed to uncovering security issues in both software and hardware to help...

McAfee Labs

HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit

McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the Angler...

McAfee Labs

I Smell a RAT: Java Botnet Found in the Wild

Most of today’s malware works on Windows and its apps, because it can affect a lot of people around the...

McAfee Labs

iBanking Mobile Trojan Poses as Facebook Token Generator

Mobile banking Trojans have usually pretended to be security applications (for example, Zitmo) or legitimate banking apps (FakeToken or FkSite a.k.a....

Mobile Security McAfee Labs

iDroid Bot for Sale Taps Into Mobile Wallets

During recent weeks we’ve seen a new botnet kit advertised in several Russian forums. The iDroidbot costs US$1,500 and targets...

McAfee Labs

IE Scripting Flaw Still a Threat to Unpatched Systems: Analyzing CVE-2018-8653

Microsoft recently patched a critical flaw in Internet Explorer’s scripting engine that could lead to remote code execution. The vulnerability...

McAfee Labs

If You Deploy Only Antivirus, It Will Cost You More and Make You Less Secure

Everyone’s looking to shave their IT budgets, manage fewer vendors and streamline. The plethora of low cost and sometimes free...

McAfee Labs

Imposter Netflix Chrome Extension Dupes 100k Users

Authored by Oliver Devane, Vallabh Chole, and Aayush Tyagi  McAfee has recently observed several malicious Chrome Extensions which, once installed,...

McAfee Labs

Improve Protection Against Cyberattacks Through Shared Threat Intelligence

This blog post was written by Rick Simon. At the RSA Conference 2016 in San Francisco, Chris Young, GM and...

McAfee Labs

In Memory of Peter Szor

Nov. 20: Update with details of memorial service at the end of this post. Earlier this week the security industry...

McAfee Labs

In NTDLL I Trust – Process Reimaging and Endpoint Security Solution Bypass

Process Reimaging Overview The Windows Operating System has inconsistencies in how it determines process image FILE_OBJECT locations, which impacts non-EDR...

Life at McAfee

Inclusion Drives Innovation: An Employee’s Perspective on Being Differently Abled

By Karla Jackson, Digital Media Specialist, McAfee “With Our People at The Heart, We Are McAfee.” If you make your...

McAfee Labs

Information Operations an Integral Part of Cyberwarfare

Weapons and the skills to use them are not the only decisive elements in warfare. Rhetoric and imagery are important,...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top