Featured Blogs
Pirate Versions of Popular Apps Infiltrate Google Play via Virtualization
The McAfee Mobile Research team recently found pirated applications of popular apps distributed on the Google Play store. A pirated...
Phishing Android Malware Targets Taxpayers in India
Authored by ChanUng Pak McAfee’s Mobile Research team recently found a new Android malware, Elibomi, targeting taxpayers in India. The malware steals sensitive financial and private information via phishing by pretending...
Phishing Threat Uses UTF-8 BOM in ZIP Signature to Evade Detection
This blog was written by Sanchit Karve. Last week, we noticed thousands of malware files in the wild that employ...
Phishing Campaigns featuring Ursnif Trojan on the Rise
Authored by Jyothi Naveen and Kiran Raj McAfee Labs have been observing a spike in phishing campaigns that utilize Microsoft...
Phishing Attacks Employ Old but Effective Password Stealer
A few months ago we received a sample from a customer that turned out to be a password stealer (PWS). One...
Phishing Attack Replaces Android Banking Apps With Malware
Mobile devices are also increasingly being used to manage a critical and important asset for all of us: our money....
Periodic Connections to Control Server Offer New Way to Detect Botnets
A number of recent botnets and advanced threats use HTTP as their primary communications channel with their control servers. McAfee...
Peeling Back the Layers of RemcosRat Malware
Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email....
PDF Phishing: Beyond the Bait
By Lakshya Mathur & Yashvi Shah Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential...