Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

Apple iOS Attack Underscores Importance of Threat Research

The recent discovery of exploit chains targeting Apple iOS is the latest example of how cybercriminals can successfully operate malicious campaigns, undetected,...

McAfee Labs

Apache Struts at REST: Analyzing Remote Code Execution Vulnerability CVE-2017-9805

Apache Struts, an open-source web development framework, is prone to vulnerabilities. We wrote about CVE-2017-9791 in July. The latest is...

McAfee Labs

Andromeda Botnet Hides Behind AutoIt

Last month, I posted a blog about an increase in the use of AutoIt scripts by malware authors to carry...

McAfee Labs

Android/TimpDoor Turns Mobile Devices Into Hidden Proxies

The McAfee Mobile Research team recently found an active phishing campaign using text messages (SMS) that tricks users into downloading...

McAfee Labs

Android/LeifAccess.A is the Silent Fake Reviewer Trojan

The McAfee Mobile Research team has identified an Android malware family dubbed Android/LeifAccess.A that has been active since May 2019....

McAfee Labs

Android Spyware Targets Security Job Seekers in Saudi Arabia

The Middle East is the new Wild West of mobile malware, especially for targeted attacks and intelligence gathering campaigns. During...

McAfee Labs

Android SpyNote attacks electric and water public utility users in Japan

Authored by Yukihiro Okutomi  McAfee’s Mobile team observed a smishing campaign against Japanese Android users posing as a power and...

Mobile Security McAfee Labs

Android Phones Vulnerable to Loss of Data, Apps

Recently security researcher Ravi Borgaonkar discussed a vulnerability that caused a Samsung Galaxy SIII to return to a factory reset...

McAfee Labs

Android Phishing Scam Using Malware-as-a-Service on the Rise in India

Authored by ZePeng Chen and Wenfeng Yu  McAfee Mobile Research Team has observed an active scam malware campaign targeting Android...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top