Securing Tomorrow. Today.

McAfee COVID-19 Report Reveals Pandemic Threat Evolution

In this “Special Edition” threat report, we dive deep into the COVID-19 related attacks observed by our McAfee Advanced Threats Research and McAfee Labs teams in the first quarter of 2020 and the early months of the pandemic.

Read Blog
McAfee Labs

Hacker Leaves Online Trail, Loses Anonymity

Since March 20, the @Anonw0rmer Twitter account has been silent. Its owner, w0rmer, is known as a member of the CabinCr3w group, a hacker team linked to Anonymous. In early February, as part of the Operations PiggyBank and PigRoast, the CabinCr3w members were suspected of hacking various police department- or ...

McAfee Labs

Android Malware Promises Video While Stealing Contacts

Recently we discovered a new Android Trojan in the official Google Play market that displays a video downloaded from the Internet–but only if some sensitive information is previously sent to a remote server. The malicious applications are designed for Japanese users and display “trailers” of upcoming video games for Android. ...

McAfee Labs

Darkshell DDOS Botnet Evolves With Variants

Darkshell is a distributed denial of service (DDoS) botnet targeting Chinese websites. It was found in 2011 and was first analyzed by Arbor Networks. McAfee Labs recently analyzed a few new samples that turned out to be variants of Darkshell, and we found extensive variations in network traffic and control ...

Enterprise

Information Security Within Emerging Markets

I’m kicking off a series of blog posts over the coming weeks and months related to emerging markets. Look for countries such as Mexico, Brazil, Peru, Colombia, and South Africa to be discussed. Later, we’ll explore other countries including those in Asia as well as Europe and the Middle East. ...

Family Safety

10 Quick Tips to Mobile Security

Mobile security is a topic I return to again and again and why not? Considering the proliferation of smartphone among the urban population of India and the demand for the same even in rural outbacks with poor internet connectivity, it is imperative to remind ourselves that along with all the ...

Mobile and IoT Security

Protect Yourself from Vishing

“Vishing” occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft. Vishing can occur both on your landline phone or via your ...

Enterprise

Social Media Security Best Practices

Facebook, Twitter, LinkedIn and other social media platforms are invaluable tools for 21st century enterprise collaboration and marketing, but they introduce multiple security hazards that organizations struggle to address. Dangers include confidential data leakage, reputational damage, social engineering opportunities for hackers, malware, and lawsuits stemming from inappropriate use by employees ...

McAfee Labs Executive Perspectives

RDP+RCE=Bad News (MS12-020)

See March 15 and 16 updates at the end of this blog. —————————————————-   The March Security Bulletin release from Microsoft was relatively light in volume. Out of the six bulletins released, only one was rated as Critical. And for good reason. MS12-020 includes CVE-2012-0002. This flaw is specific to the Remote ...

McAfee Labs

Android Malware Pairs Man-in-the-Middle With Remote-Controlled Banking Trojan

Based on the Android malware that we’ve seen so far, one of the principal motivations to develop and spread malware on Android is to gain financial profit. We often see deceptive applications that send SMS messages to premium-rate numbers without the user’s consent or that run man-in-the-middle attacks to forward ...

Enterprise Security Operations

An Update on DNSChanger and Rogue DNS Servers

In late 2011, the FBI released documents and data focusing on “Operation Ghost Click.” This malicious operation, leveraging a variety of DNSChanger-type malware, was defined by the FBI as an “international cyber ring that infected millions of computers.” Associated malware samples and events can be traced back several years, and multiple platforms were targeted. ...

Subscribe to McAfee Securing Tomorrow Blogs