Featured Blogs
How Hackers Bypassed an Adobe Flash Protection Mechanism
The number of Flash Player exploits has recently declined, due to Adobe’s introduction of various measures to strengthen Flash’s security....
McAfee Employees Share How They #PressForProgress on International Women’s Day
By Karla, Digital Media Specialist During the month of March, we’re excited to support International Women’s Day (March 8) and...
Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant
This post was prepared with contributions from Asheer Malhotra, Charles Crawford, and Jessica Saavedra-Morales. On February 28, the McAfee Advanced...
How Do You #PressForProgress?
By Marty, Regional Sales Director March 8th marks the 108th year the world has celebrated International Women’s Day. During those...
McAfee Researchers Analyze Dark Side of Cryptocurrency Craze
In December 2017 Bitcoin values skyrocketed, peaking at the unprecedented amount of roughly US$19,000 per coin. Unsurprisingly, the market for...
McAfee Researchers Find Poor Security Exposes Medical Data to Cybercriminals
Those who have successfully gained access to medical data have been well rewarded for their efforts. One seller stated in an interview that “someone wanted to buy all the … records specifically,” claiming that the effort had netted US$100,000.
McAfee Labs Threats Report Examines Cryptocurrency Hijacking, Ransomware, Fileless Malware
Today McAfee published the McAfee Labs Threats Report: March 2018. The report looks into the growth and trends of new malware, ransomware, and other threats in Q4 2017. McAfee Labs saw on average eight new threat samples per second, and the increasing use of fileless malware attacks leveraging Microsoft PowerShell. ...
Necurs Botnet Leads the World in Sending Spam Traffic
In Q4 2017 we found that the Necurs and Gamut botnets comprised 97% of spam botnet traffic. (See the McAfee...
Ransomware Takes Open-Source Path, Encrypts With GNU Privacy Guard
McAfee Labs has recently observed a new variant of ransomware that relies on the open-source program GNU Privacy Guard (GnuPG)...