Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

Analyzing CVE-2017-0190: WMF Flaws Can Lead to Data Theft, Code Execution

CVE-2017-0190 is a recently patched vulnerability related to Windows metafiles (WMFs), a portable image format mainly used by 16-bit Windows...

McAfee Labs

Analyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service

The network time protocol synchronizes time across various devices on a network. The network time protocol daemon (NTPD) is an...

McAfee Labs

Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423

Introduction As of July 2019, Microsoft has fixed around 43 bugs in the Jet Database Engine. McAfee has reported a...

McAfee Labs

Analyzing a Patch of a Virtual Machine Escape on VMware

This blog was written by Yakun Zhang. A virtual machine is a completely isolated guest operating system installation within a...

McAfee Labs

Analyzing a Fresh Variant of the Dorkbot Botnet

This blog post was written by Sudhanshu Dubey. At McAfee Labs, we have recently observed a new variant of the...

McAfee Labs

Analysis of LooCipher, a New Ransomware Family Observed This Year

Co-authored by Marc RiveroLopez. Initial Discovery This year seems to again be the year for ransomware. Notorious attacks were made...

McAfee Labs

Analysis of Chrysaor Keylogging Mechanism Shows Power of Simple Malicious Code

Many attacks on mobile devices use social engineering to initially infect a victim’s system. They download malware and elevate privileges...

McAfee Labs

Analysis of a Chrome Zero Day: CVE-2019-5786

1. Introduction On March 1st, Google published an advisory [1] for a use-after-free in the Chrome implementation of the FileReader...

McAfee Labs

An Overview of Messaging Botnets

In the quarterly McAfee Threats Reports we offer our readers some charts on the prevalence of messaging botnets. For the...

McAfee Labs

An Overview of Malware Self-Defense and Protection

Many malware authors spend a great deal of time and effort to develop complex code. Their success depends on a...

McAfee Labs

An Overall Philosophy on the Use of Critical Threat Intelligence

The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and...

McAfee Labs

An Inside Look into Microsoft Rich Text Format and OLE Exploits

There has been a dramatic shift in the platforms targeted by attackers over the past few years. Up until 2016,...

McAfee Labs

Amazon Gift Card Malware Spreading via SMS

McAfee Labs recently published its Hacking the Human OS report, which details a number of ways in which cybercriminals rely...

Life at McAfee

All Work and No Play? Not at McAfee!

By Srinidhi, Software Quality Engineer There’s more to life than work.   It’s a commonly held and often stated view, but companies...

McAfee Labs

Agent Tesla’s Unique Approach: VBS and Steganography for Delivery and Intrusion

Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the...

McAfee Labs

Adylkuzz CoinMiner Spreading Like WannaCry

The last few days have been very busy for security teams all around the globe due to the nasty ransomware...

Mobile Security McAfee Labs

Adult Voice-Service Apps on Google Play Japan Charge Users Without Notice

McAfee has reported on increasing fraudulent Android applications on Google Play in Japan this year, including one-click fraud applications and...

Mobile Security McAfee Labs

Adobe Flash Player Installer Scams Reappear on Google Play

Adobe Flash Player has been a boon to Android malware creators for a long time. These developers have taken advantage...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top