Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

CelebGate: a Long, Dangerous List of Celebrities

During the past few days, the media has been abuzz with the massive celebrity photo leak nicknamed CelebGate 2014. The...

Life at McAfee

Celebrating Halloween – McAfee Style

By Dawson McPherson, Talent & Communications Coordinator Two weeks ago, I stepped into the McAfee Plano office with a mixture...

Life at McAfee

Celebrating International Day of Women and Girls in Science

Advice and Insights from some of McAfee’s brightest STEM leaders This International Day of Women and Girls in Science, #TeamMcAfee...

Life at McAfee

Celebrating multi-national cultures this Hispanic Heritage Month

Do you know the difference between Hispanic and Latino? What about the traditions that are important parts of the Hispanic...

McAfee Labs

Cerber Ransomware Evades Detection With Many Components

This blog was co-written by Sapna Juneja. Cerber is a quickly evolving type of malware called crypto-ransomware. Cerber encrypts files...

McAfee Labs

Cerber Ransomware Now Hunts for Databases

  Cerber is one of the most popular ransomware packages. It has upgraded itself to also target databases. It is...

McAfee Labs

Cerber Ransomware Updates Configuration File

This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the...

Mobile Security McAfee Labs

Chat Friend Finder Apps on Google Play Leak Personal Information

Somewhat controversial websites or apps called chat friend finders, or ID BBS (Bulletin Board System) are spreading widely in Japan....

McAfee Labs

Chinese Cybercriminals Develop Lucrative Hacking Services

Underground cybercrime profits in China have likely already exceeded US$15.1 billion (100 billion Chinese yuan); caused more than $13.8 billion...

McAfee Labs

Chinese Trojan Hooks Macs, iPhones

“Distrust and caution are the parents of security”–Benjamin Franklin A recent threat targeting Chinese users of Mac OS X and...

McAfee Labs

Cidox Trojan Spoofs HTTP Host Header to Avoid Detection

Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP...

McAfee Labs

Clever Billing Fraud Applications on Google Play: Etinu

Authored by: Sang Ryol Ryu and Chanung Pak A new wave of fraudulent apps has made its way to the...

McAfee Labs

Clever Phishing Attacks Target Google, Yahoo, DHL Customers

Last week McAfee Labs received a phishing page that efficiently uses the CSS format of the Gmail login page and...

McAfee Labs

ClickFix Deception: A Social Engineering Tactic to Deploy Malware

Authored by Yashvi Shah and Vignesh Dhatchanamoorthy McAfee Labs has discovered a highly unusual method of malware delivery, referred to...

McAfee Labs

Clop Ransomware

This new ransomware was discovered by Michael Gillespie on 8 February 2019 and it is still improving over time. This...

McAfee Labs

CLOP Ransomware exploits MOVEit software

Authored by: Abhishek Karnik and Oliver Devane You may have heard recently in the news that several organizations, including banks,...

McAfee Labs

Cloud Clustering Vulnerable to Attacks

The authors thank John Fokker and Marcelo CaroVargas for their contributions and insights. In our upcoming talk at the Cloud...

McAfee Labs

Code Execution Technique Takes Advantage of Dynamic Data Exchange

Email phishing campaigns are a popular social engineering technique among hackers. The idea is simple: Craft an email that looks...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top