Featured Blogs
One-Click Scammers Still Targeting Japanese Smartphone Users
Last year we saw an attack targeting Android device users in which more than 2,400 malicious one-click fraud apps were...
Neverquest Banking Trojan Uses VNC, SOCKS in New Threat
A new banking Trojan in the news, known as Neverquest, is active and being used to attack a number of...
Analyzing the Target Point-of-Sale Malware
January 21, 2014: As more information comes to light, surrounding these events, we continue to identify and analyze additional components...
2014 Threats Predictions: Network and Host Attacks Will Again Target Apps, Java
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions....
2014 Threats Predictions: Cybercrime and Hacktivism Will Continue to Grow
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions....
2014 Threats Predictions: Software Defined Networking And More
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions....
Variant of Pony Botnet Pickpockets Bitcoin Users
Last month the Pony Botnet became a household name when it was revealed that it had stolen more than two...
2014 Threats Predictions: Cloud Attacks Could Lead to Data Loss
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In...
Suspicious Apps on Google Play Leak Google Account IDs
The Google account ID (or account name), which in most cases is a Gmail address, is one of the key...
Analyzing the Recent Windows Zero-Day Escalation of Privilege Exploit
Recently we caught a malicious sample that exploits a PDF vulnerability–CVE-2013-3346, we believe–and executes after a use-after-free condition occurs. During...