Featured Blogs
Spy? Where? Mobile Spyware Hiding Right Under Your Nose
Some days it feels like the whole world is going mobile. We tweet, we text, we browse the world from...
Spreading the Flame: Skywiper Employs ‘Windows Update’
Microsoft has issued Security Advisory 2718704, in which the company disclosed that it recently became aware of the Flamer/Skywiper threat,...
Spotting Fake News: Teaching Kids to be Responsible Online Publishers
Editor’s note: This is part II in a series on Fake News. Read part I, here. Kids today are not...
Spotlighting McAfee’s Women in Technology Scholarship Recipients
Working at McAfee is so much more than fighting off cyber-attacks; it’s also about learning valuable life lessons and fostering...
Spotlight on Shamoon
Our analysis this month has pointed to Shamoon emerging in the Middle East. We have recently seen a number of...
Spotify and Minecraft Account Info Posted Online, Are You Safe?
This blog was written by Bruce Snell. One of my favorite scenes in The Avengers is when Captain America tells...
Spot Those Black Friday and Cyber Monday Shopping Scams
We’re not the only ones looking forward to the big holiday sales like Black Friday and Cyber Monday. Hackers are too. As people flock to retailers big and small in search of the best deals online, hackers have their shopping scams ready.
Spora Ransomware Infects ‘Offline’—Without Talking to Control Server
Spora is a ransomware family that encrypts victims’ files and demands money to decrypt the files. It has infected many...
Spitmo vs Zitmo: Banking Trojans Target Android
SpyEye and Zeus are probably the most prevalent and active Trojan “banker” families seen in the wild. (Bankers steal bank...
Speed or Security? We Say Speed AND Security
“Security software slows down my PC.” We often hear this sentiment when users talk about malware protection. While people recognize...
Special Delivery: Criminals Posing as Amazon Are Out to Steal User’s Data
One of the joys of online shopping is instant gratification – your purchases arrive on your doorstep in just a few...
Spanish MSSP Targeted by BitPaymer Ransomware
Co-authored by Marc RiveroLopez Initial Discovery This week the news hit that several companies in Spain were hit by a...
SonicSpy Malware Snoops on Google Play Users via Messaging Apps
Whether it’s a British spy sneaking around a casino, or a cybercriminal looking around your device, all spies snoop to...
Sonakshi Sinha tops the list of McAfee Most Sensational Celebrities 2016
Celebrities bedazzle and bewitch us and we cannot have enough of them. Whether they be actors, singers, models, comedians or...
Something’s Phishy With the Instagram “HotList”
Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages...
Solving the Mystery of the Office Zero-Day Exploit and DEP
On November 5 McAfee Labs blogged about a Microsoft Office zero-day attack that we spotted in the wild. In another...
Solving the Gamer’s Dilemma: Security vs. Performance
As of last year, 2.2 billion1 people consider themselves gamers across the globe. Of that 2.2 billion, over 50% – 1.22...
Software Company WakeNet AB Discovered Spreading PUPs to Users
Pay-per-install, or PPI for short, is a type of software program that presents users with third-party offers while they are...
Social Underground: Kids Using Google Docs as New Digital Hangout
Over the years kids have succeeded in staying one step ahead of parents on the digital front. Remember the golden...
Social Security Scam Emails and a Healthcare Data Breach: This Week in Scams
Emails claiming to be from Social Security are making the rounds right now. They look official. They sound official. And they’re designed...
Social Network Account Stealers Hidden in Android Gaming Hacking Tool
Authored by: Wenfeng Yu McAfee Mobile Research team recently discovered a new piece of malware that specifically steals Google, Facebook,...
Social Media: Where Cybercrime Lurks in the Shadows
When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark...
Social Media: How to Steer Your Family Clear of Cryptomining Malware
It’s fun to jump on our favorite social media sites such as Facebook, Instagram, or LinkedIn and know we can...
Social Media Swamped by Social Botnets
As anyone with a newsfeed will tell you, fake social media accounts have been on the rise in recent years....
Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing!
An Indian investigative portal Cobrapost, recently released a report on alleged online reputation smearing/management/campaigns designed to gain/destroy political capital for who ever was...
Social Media Harassment is a Real Threat. Here’s How to Protect Yourself.
It is an almost undisputable truth that access to a cloak of anonymity and a large, large microphone brings the...
Social Engineering—The Scammer’s Secret Weapon
Social engineering. It’s a con game. And a con game by any other name stings just as badly. Like any...
