Featured Blogs
Cidox Trojan Spoofs HTTP Host Header to Avoid Detection
Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP...
Chinese Trojan Hooks Macs, iPhones
“Distrust and caution are the parents of security”–Benjamin Franklin A recent threat targeting Chinese users of Mac OS X and...
Chinese Cybercriminals Develop Lucrative Hacking Services
Underground cybercrime profits in China have likely already exceeded US$15.1 billion (100 billion Chinese yuan); caused more than $13.8 billion...
Chat Friend Finder Apps on Google Play Leak Personal Information
Somewhat controversial websites or apps called chat friend finders, or ID BBS (Bulletin Board System) are spreading widely in Japan....
Cerber Ransomware Updates Configuration File
This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the...
Cerber Ransomware Now Hunts for Databases
Cerber is one of the most popular ransomware packages. It has upgraded itself to also target databases. It is...
Cerber Ransomware Evades Detection With Many Components
This blog was co-written by Sapna Juneja. Cerber is a quickly evolving type of malware called crypto-ransomware. Cerber encrypts files...
Celebrating multi-national cultures this Hispanic Heritage Month
Do you know the difference between Hispanic and Latino? What about the traditions that are important parts of the Hispanic...
Celebrating International Day of Women and Girls in Science
Advice and Insights from some of McAfee’s brightest STEM leaders This International Day of Women and Girls in Science, #TeamMcAfee...