Featured Blogs
How we’re #InspiringInclusion at McAfee for International Women’s Day 2024
International Women’s Day 2024’s theme, #InspireInclusion, reminds us that genuine change requires going beyond individual actions. It’s about fostering an...
How You (and Your Teen) Can Stay Safe While Looking for Love Online
Valentine’s Day is such a double-edged sword. If you’re feeling the love and just can’t get enough of your sweetheart...
How ‘Switcher’ Malware Moves an Attack from Your Phone to Your Router
Why attack one device when you can get inside an entire network and manipulate every device connected to it? That’s...
Hunting for Blues – the WSL Plan 9 Protocol BSOD
Windows Subsystem for Linux Plan 9 Protocol Research Overview This is the final blog in the McAfee research series trilogy...
HVACking: Understanding the Delta Between Security and Reality
The McAfee Labs Advanced Threat Research team is committed to uncovering security issues in both software and hardware to help...
Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety
Over the past year and a half, workers everywhere have gotten used to working from home. They have adopted an...
HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit
McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the Angler...
I Smell a RAT: Java Botnet Found in the Wild
Most of today’s malware works on Windows and its apps, because it can affect a lot of people around the...
iBanking Mobile Trojan Poses as Facebook Token Generator
Mobile banking Trojans have usually pretended to be security applications (for example, Zitmo) or legitimate banking apps (FakeToken or FkSite a.k.a....
