Featured Blogs
Phishing Threat Uses UTF-8 BOM in ZIP Signature to Evade Detection
This blog was written by Sanchit Karve. Last week, we noticed thousands of malware files in the wild that employ...
Phishing Scam Targets Walmart.com Online Customers
Late last week, Walmart alerted the public to an email-based scam that used the company’s name (misspelled as “Wallmart”) to...
Phishing Goes Mobile: New Android Malware Hits Google Play
Sometimes, things just aren’t as they seem to be. For example, last year, Google Play hosted a round of mobile...
Phishing Campaigns featuring Ursnif Trojan on the Rise
Authored by Jyothi Naveen and Kiran Raj McAfee Labs have been observing a spike in phishing campaigns that utilize Microsoft...
Phishing Attacks Employ Old but Effective Password Stealer
A few months ago we received a sample from a customer that turned out to be a password stealer (PWS). One...
Phishing Attack Replaces Android Banking Apps With Malware
Mobile devices are also increasingly being used to manage a critical and important asset for all of us: our money....
Petya is Here, And It’s Taking Cues from WannaCry
Just over a month after the infamous WannaCry attack, a new worldwide cyberattack is here again. Its name is Petya, or Petwrap, it’s...
Personal and Professional Development From Home
Personal and Professional Development from Home Like so many of us, I’m doing my best to look forward. While everyone’s...
Periodic Connections to Control Server Offer New Way to Detect Botnets
A number of recent botnets and advanced threats use HTTP as their primary communications channel with their control servers. McAfee...