Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

Apply MITRE’s ‘ATT&CK’ Model to Check Your Defenses

Every week we read about adversaries attacking their targets as part of online criminal campaigns. Information gathering, strategic advantage, and...

Life at McAfee

How I Wear My #McAfeePride

By: Keyeon, Business Development Representative Imagine if you felt like you had to keep a secret from everyone you know,...

McAfee Labs

McAfee Labs Threats Report Features Innovative Attacks, Crypto Mining, Multisector Attacks

In the McAfee Labs Threats Report June 2018, published today, we share investigative research and threat statistics gathered by the McAfee Advanced Threat Research and McAfee Labs teams in Q1 of this year.

McAfee Labs

AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play

The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on...

McAfee Labs

AsiaHitGroup Returns With New Billing-Fraud Campaign

Are you tired yet of the music track “Despacito”? If you downloaded this ringtone app from Google Play, chances are...

McAfee Labs

Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events

Every four years, everyone’s head around the globe turns toward the television. The Olympics, the World Cup – world events like...

McAfee Labs

Organizations Leave Backdoors Open to Cheap Remote Desktop Protocol Attacks

While researching underground hacker marketplaces, the McAfee Advanced Threat Research team has discovered that access linked to security and building automation systems of a major international airport could be bought for only US$10.

McAfee Labs

Google Play Users Risk a Yellow Card With Android/FoulGoal.A

This blog post was co-written by Irfan Asrar. English soccer fans have enthusiastically enjoyed the team’s current run in the...

McAfee Labs

What Drives a Ransomware Criminal? CoinVault Developers Convicted

How often do we get a chance to learn what goes on in the minds of cybercriminals? Two members of...

Life at McAfee

How My McAfee Internship Launched My Career

By: Ruby, Digital Media Specialist It’s often assumed that interns are usually college undergraduates with a temporary assignment. I’m an...

Life at McAfee

Facing the Fear of Public Speaking with Toastmasters

By: DaWane, Sales Director Standing in front of 800 parents and fellow students to deliver the welcome address, thoughts swirled...

Life at McAfee

McAfee Interns Share Their Experience for #NationalInternDay

By Christie, HR Communications Intern As someone who always wanted to make an impact in the world, I thought nonprofit...

McAfee Labs

CactusTorch Fileless Threat Abuses .NET to Infect Victims

McAfee Labs has noticed a significant shift by some actors toward using trusted Windows executables, rather than external malware, to...

McAfee Labs

GandCrab Ransomware Puts the Pinch on Victims

Update: On August 9 we added our analysis of Versions 4.2.1 and 4.3.  The GandCrab ransomware first appeared in January...

McAfee Labs

Examining Code Reuse Reveals Undiscovered Links Among North Korea’s Malware Families

Attacks from the online groups Lazarus, Silent Chollima, Group 123, Hidden Cobra, DarkSeoul, Blockbuster, Operation Troy, and 10 Days of Rain are believed to have come from North Korea. But how can we know with certainty?

McAfee Labs

80 to 0 in Under 5 Seconds: Falsifying a Medical Patient’s Vitals

With the explosion of growth in technology and its influence on our lives, we have become increasingly dependent on it. The medical field is no exception: Medical professionals trust technology to provide them with accurate information and base life-changing decisions on this data.

Life at McAfee

Q&A with Software QA Manager: How McAfee Empowers Me to Shape the Future

By Simon, Software QA Manager Simon is a Software Quality Assurance Manager at the McAfee Aylesbury office. He joined the...

McAfee Labs

Microsoft Cortana Allows Browser Navigation Without Login: CVE-2018-8253

A locked Windows 10 device with Cortana enabled on the lock screen allows an attacker with physical access to the device to do two kinds of unauthorized browsing.

Subscribe to McAfee Securing Tomorrow Blogs

Back to top