Featured Blogs
File-Hosting Site Turns Your File Into Adware
We recently received a sample from a customer and upon initial analysis it looked like a bundled software installer. Upon...
A Case of Mistaken Identity? The Role of BlackEnergy in Ukrainian Power Grid Disruption
Recent reports of electricity outages across the Ukraine has led to significant speculation regarding the specific malware that was used...
HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit
McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the Angler...
Ransomware Targets Healthcare Sector
When we develop threats predictions at McAfee, I personally like to conduct some proper research and base my statements on...
Clever Phishing Attacks Target Google, Yahoo, DHL Customers
Last week McAfee Labs received a phishing page that efficiently uses the CSS format of the Gmail login page and...
Does Anyone Really Care About Mobile Security?
I’ve attended Mobile World Congress a number of times and it is fair to say the concept of the show...
Nivdort: Data-Stealing Trojan Arrives via Spam
During the past couple of weeks, McAfee Labs has observed a huge increase in spam related to Nivdort, a malicious file...
Malicious Forums Turn Amateur Hackers Into Cybercriminals
Security researchers are aware of forums that offer downloads of malicious software such as keyloggers and remote access tools. Some inexperienced...
Targeted Ransomware No Longer a Future Threat
This post was written by Christiaan Beek and Andrew Furtak. In 2015, McAfee investigated a ransomware campaign that targeted the...