Securing Tomorrow. Today.

McAfee COVID-19 Report Reveals Pandemic Threat Evolution

In this “Special Edition” threat report, we dive deep into the COVID-19 related attacks observed by our McAfee Advanced Threats Research and McAfee Labs teams in the first quarter of 2020 and the early months of the pandemic.

Read Blog
McAfee Labs

No Winners at QR Code Roulette

Last year a friend had a bright idea for a party game that involved a series of QR codes in a circle on paper. He called it QR Code Roulette. Unlike the gambling game, selecting the right 2D barcode did not make you a winner. It turned out that every ...

Executive Perspectives

15 Minutes with… David O’Berry

Welcome to “15 minutes with” – an occasional contribution between myself and the movers-and-shakers within McAfee’s technical community. This week on the stand is my good friend and occasional co-presenter, David O’Berry CSSLP, CISSP-ISSAP, ISSMP, CRMP. Now a McAfee Strategic systems engineer, his previous life was 19 years in the ...

McAfee Labs

Rooting Exploit for Android Works Silently

In our last blog about Android malware, we discussed the expanding threat landscape for Android malware. Recently, we received an Android package in our collection and observed that this malicious application uses a rooting exploit that targets Android devices running OS Versions 2.3 or earlier to gain root privileges on ...

McAfee Labs

Spitmo vs Zitmo: Banking Trojans Target Android

SpyEye and Zeus are probably the most prevalent and active Trojan “banker” families seen in the wild. (Bankers steal bank passwords and other financial data.) At the beginning of the year there was a rumor about the “merger” of both toolkits into a new generation of banking Trojan. It is not ...


McAfee Security Certification Program

McAfee Security Certification Program Today, McAfee is excited to announce the addition of two new exams and certifications to our McAfee Security Certification Program. We launched the program back in January with two initial assessments, promising to add to our curriculum as time went on. The two new certifications, McAfee ...

McAfee Labs

Why Does My Car Have Its Own Smartphone?

You would be surprised at the number of places you can find a GSM SIM card. Outside of your mobile phone, they can be found in power meters, water meters, vending machines, etc. These SIM cards (virtually identical to the one in your mobile phone) are used for machine-to-machine communication. Essentially ...


Spearphishing Best Practices

What is the biggest threat to your company’s network? Look in the mirror. A huge percentage of recent high profile attacks, including those perpetrated on Epsilon, RSA, the Oak Ridge Laboratories in Tennessee, and the Gmail accounts of government officials—not to mention Operation SHADY Rat—are suspected to be based on ...


Building a Better Shady RAT Trap: Security Connected Framework

Recently Dmitri Alperovitch, McAfee’s VP of Threat Research, published a blog about Operation Shady RAT. In the blog and corresponding whitepaper he details an investigation of targeted intrusions into over 70 global companies, governments, and non-profit organizations over the last five years that appear to be sourced from a single ...

Family Safety

Guide To Online Banking Safety for Confident Consumers

A recent poll revealed that 54% of U.S. consumers said the theft of their personal or financial information worried them more than losing their job or not having healthcare for their family members.[1] Their worry is not unfounded. As President Obama recently acknowledged, while the Internet has transformed how we ...

Family Safety Identity Protection

Myth: Apple Products Don’t Get Viruses

Have you ever bitten into an apple and found a worm? I have, and it’s yummy! Anyway, how many times have you heard, or even said, “I won’t get that computer virus because I have a Mac”?  While Mac users tend to feel somewhat insulated from viruses, it’s time for ...

Subscribe to McAfee Securing Tomorrow Blogs