Featured Blogs
Beware the Rapid Proliferation of Cyber-warfare Capabilities
Governments across the globe continue to invest in cyber warfare operations. Over 60 countries, a number that is rising, currently...
Beware of Impostor Android Apps Using Fake ID
Recently discovered, an Android vulnerability called Fake ID allows apps to impersonate other apps by copying their identity. Each app...
Best practices for preventing Dridex infections
Mitigating the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of...
Best Practices for Adapting to a Remote Work Lifestyle
As our world continues to evolve, we have been forced to adapt accordingly. Navigating change can be difficult for many, so...
Beneath the Surface: How Hackers Turn NetSupport Against Users
NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we delve...
Behind the CAPTCHA: A Clever Gateway of Malware
Authored by Yashvi Shah and Aayush Tyagi Executive summary McAfee Labs recently observed an infection chain where fake CAPTCHA pages...
Banned Chinese Qvod Lives on in Malicious Fakes
Qvod used to be a popular video player and developer in China. Due to piracy allegations and a threatened fine,...
Banload Trojan Targets Brazilians With Malware Downloads
McAfee Labs has recently encountered new variants of the Banload Trojan. Banload has been around since the last decade. This...
Bank Account Logins for Sale, Courtesy of Citadel Botnet
Financial theft is one of the most lucrative forms of cybercrime. Malware authors continue to deliver sophisticated tools and techniques...