Featured Blogs
Why Process Reimaging Matters
As this blog goes live, Eoin Carroll will be stepping off the stage at Hack in Paris having detailed the...
Why Republic Day of India Matters to Me and McAfee
By Smriti, HR Partner At McAfee, we love to recognize and celebrate the traditions and holidays observed by our employees...
Wildfire Ransomware Extinguished by Tool From NoMoreRansom
McAfee and Kaspersky Lab, partners in the project NoMoreRansom, are pleased to announce today the availability of a decryption tool...
Win32/Syndicasec Used In Targeted Attacks Against Indian Organizations
During the last couple of months, we’ve observed several RTF exploits that target Indian organizations. The first RTF exploit was...
With Release of Windows 10, Questions About BitLocker Arise Again
This post was written by Ted Pan. For those of you who were around during the original release of Microsoft’s...
Women in Sales Part 1: Opportunities for Women Across Cybersecurity Sales
Collaborative, inclusive teams are what redefine cybersecurity solutions for every aspect of our connected world. At McAfee, women are making...
Women in Sales Part 2: Skilling up for a Career in Cybersecurity Sales
McAfee fosters an inclusive environment where we value varied life experiences. To showcase women who are making an impact and inspire others, we launched our Women in Sales Series. In Part 1, McAfee...
Women in Sales Part 3: Traits for Success in Cybersecurity Sales
At McAfee, women are finding the inclusiveness and tools to succeed in cybersecurity sales, a field often misconceived because of its technical background. They are doing...
Women in Sales Part 5: The Value of Support Networks and Inspiration
Women at McAfee are making powerful contributions to our sales efforts. Saleswomen from varying backgrounds share their unique perspectives in hopes of encouraging more women...
Worms Could Spread Like Zombies via Internet of Things
Security researchers recently created a proof-of-concept attack against Internet-connected lightbulbs, causing breached devices to infect their neighbors. The propagation...
Xirtem Worm Hides in CAB/SFX Files
W32/Xirtem@@MM is a fast-spreading and active worm, discovered in late 2008, that uses a variety of methods to propagate. The...
XLSM Malware with MacroSheets
Written by: Lakshya Mathur Excel-based malware has been around for decades and has been in the limelight in recent years. During the second half of 2020, we saw...
Yahoo Ads Serve Mobile Fake Alerts
“Android Armour,” a malicious knockoff of Armor For Android, has been circulating for some time with no end in sight, perhaps...
You Bring the Yoga Mat, McAfee Brings the Goats
Yogis are likely familiar with the term vinyasa, but have you heard of caprine vinyasa? Caprine vinyasa elevates your standard...
Your Smart Coffee Maker is Brewing Up Trouble
A smart coffee maker, like other smart appliances, connects to your home network, offering convenience features such as scheduling brew times, remote start, and customization of your coffee preferences. However, this connectivity also opens the door to potential cybersecurity threats.
YouTube Video Scam Targets Facebook Users
Be advised cybercriminals are at it again, leveraging the popularity of Facebook and YouTube to scam consumers.We have seen several...
Zbot Botnet Steals Thousands of Credentials
In McAfee Labs we keep a close eye on the Zeus/Zbot/Gamover botnet malware that is responsible of thousands of samples...
Zcrypt Expands Reach as ‘Virus Ransomware’
McAfee has recently seen a new kind of ransomware–Zcrypt—that can self-replicate. This “virus ransomware” arrives via email in a malicious...
ZeroAccess Rootkit Launched by Signed Installers
Digital certificates and certificate authorities have been much in the news recently. Attacks–such as those used by Stuxnet, Duqu, and...
Zeus Crimeware Toolkit
The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This...
Zloader With a New Infection Technique
This blog was written by Kiran Raj & Kishan N. Introduction In the last few years, Microsoft Office macro malware...
‘BadRabbit’ Ransomware Burrows Into Russia, Ukraine
This post was researched and written by Christiaan Beek, Tim Hux, David Marcus, Charles McFarland, Douglas McKee, and Raj Samani. McAfee...
‘Cat-Loving’ Mobile Ransomware Operates With Control Panel
Recently the McAfee Labs Mobile Malware Research team found a sample of ransomware for Android with botnet capabilities and a...
‘McAfee Labs Threats Report’ Highlights Cryptojacking, Blockchain, Mobile Security Issues
As we look over some of the key issues from the newly released McAfee Labs Threats Report, we read terms such as voice assistant, blockchain, billing fraud, and cryptojacking.
‘Operation Sharpshooter’ Targets Global Defense, Critical Infrastructure
This post was written with contributions from the McAfee Advanced Threat Research team. The McAfee Advanced Threat Research team...
‘Tis the Season for Scams
Co-authored by: Sriram P and Deepak Setty ‘Tis the season for scams. Well, honestly, it’s always scam season somewhere. In...