Featured Blogs
‘McAfee Labs Threats Report’ Delves Into Dangers of Data Loss
This blog post was written by Rick Simon. Data is leaking out of your organization: accidentally or intentionally, by internals...
‘Insight’ into Home Automation Reveals Vulnerability in Simple IoT Product
Eoin Carroll, Charles McFarland, Kevin McGrath, and Mark Bereza contributed to this report. The Internet of Things promises to make...
‘Evoltin’ POS Malware Attacks via Macro
Over the past couple of months McAfee Labs has seen an increase in the usage of macros to deliver malware....
‘DHL’ SMS Spam Distributes Android Malware in Germany
One of the most common methods for distributing PC malware is the use of email spam messages that pose as...
‘Bioskits’ Join Ranks of Stealth Malware
We have seen many discussions of the MyBios “Bioskit” discovered at the end of 2011. MyBios was the first malware...
‘Android/NotCompatible’ Looks Like Piece of PC Botnet
A lot of recent attacks on Android users are attributed to fake websites of popular applications such as Cut the...
"Operation Aurora" Leading to Other Threats
Operation Aurora has received a lot of attention over the past couple of days. To recap, Google, Adobe, and many...
#WSPD Creating hope through action with The Jordan Legacy
*TW: Mentions Suicide Our passion for protecting people doesn’t stop with online safety. We deeply care for our people, their...
#McAfeePride2022
In the spirit of #PrideMonth, McAfee hosted month-long celebrations across the world. One of these was a live event hosted...
“Trojanization” of Legit Apps on the Rise
McAfee today released its McAfee Labs Threats Report: December 2016. The report’s third key topic illustrates how attackers are creating...
“Fool’s Gold”: Questionable Vaccines, Bogus Results, and Forged Cards
Preface Countries all over the world are racing to achieve so-called herd immunity against COVID-19 by vaccinating their populations. From...