Featured Blogs
Steamstealer Attacks Victims via Chat
During the last few months, McAfee Labs has seen an increase in Steamstealer samples. The following chart shows the recent...
Stefan’s Tale: A 17-Year Journey to McAfee
By Stefan, Senior Security Consultant in Sydney, Australia. When I was younger, I wanted to be a policeman and help...
Stolen Credit Card Numbers Easy to Buy Online
We have seen an increasing amount of articles published about the “Dark Web,” underground cybercriminal sites that are hosted on...
Stolen with a Click: The Booming Business of PayPal Scams
In today’s digital age, online payment platforms like PayPal have become essential tools for our everyday transactions. Unfortunately, they’ve also...
Stopping Malware With a Fake Virtual Machine
As we explained in a previous post, some advanced malware can detect a virtual environment such as a sandbox to...
Stuxnet Update
Stuxnet has received a lot of attention since McAfee first blogged about it in July. This post will answer some of...
Styx Exploit Kit Takes Advantage of Vulnerabilities
Web-based malware has increased over the last few years due to an abrupt spike in new exploit kits. These kits...
SUNBURST Malware and SolarWinds Supply Chain Compromise
Part I of II Situation In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds’s...
Supporting Our Military Veterans at McAfee
By Dawson McPherson, Talent & Communications Coordinator Over the past week, McAfee employees around the world paused to recognize and...
Suspicious Apps on Google Play Leak Google Account IDs
The Google account ID (or account name), which in most cases is a Gmail address, is one of the key...
Suspicious Mobile App Finds Your Gmail, Facebook, and Twitter Accounts
Today many people use multiple web services, such as social networking and messaging services. Some users explicitly show their identity...
Syn/Ack Unique Proactive Protection Technique
McAfee’s Advanced Threat Research team has performed analysis on samples of Syn/Ack ransomware implementing Process Doppelgänging. For those who are...
Syrian Crisis Reminds Us to Beware of ‘Charity’ Scams
The dismal situation in Syria has gained considerable sympathy in the rest of the world. Unfortunately, playing on our emotions...
Taiwan Bank Heist and the Role of Pseudo Ransomware
Widespread reports claim the Far Eastern International Bank in Taiwan has become a victim of hacking. The attacks demonstrate the global nature of cybercrime, with the cybercriminals attempting to wire US$60 million to destinations such as Sri Lanka, Cambodia, and the United States.
Take a “NetWalk” on the Wild Side
Executive Summary The NetWalker ransomware, initially known as Mailto, was first detected in August 2019. Since then, new variants were...
Takedown Stops Polymorphic Botnet
Several global law enforcement agencies—with assistance from McAfee —this week successfully dismantled the “Beebone” botnet behind a polymorphic worm known...
Taking a Close Look at Data-Stealing NionSpy File Infector
This blog was written by Sanchit Karve. W32/NionSpy is a family of malware that steals information from infected machines and...
Taking Steps to Fight Back Against Ransomware
Ransomware is an attack in which malware encrypts files and extorts money from victims. It has become a favorite among...