Securing Tomorrow. Today.

McAfee COVID-19 Report Reveals Pandemic Threat Evolution

In this “Special Edition” threat report, we dive deep into the COVID-19 related attacks observed by our McAfee Advanced Threats Research and McAfee Labs teams in the first quarter of 2020 and the early months of the pandemic.

Read Blog
McAfee Labs

Dissecting Zeus for Android (or Is It Just SMS Spyware?)

Zeus, also known as ZBot, is one of best-known malware in the industry. The main purpose of this malware is to steal banking credentials, allowing attackers to commit electronic fraud. Until 2010, Zeus existed only for personal computers since this platform was (and still is) the principal medium for electronic ...

Family Safety Identity Protection

Social Networking Security Awareness

One in five online consumers has been a victim of cybercrime in the past two years. Social networking is a direct link to the problem. While social networks allow you to keep in touch with family and friends, there are issues to be concerned about. Most concerns revolve around online ...

Enterprise

June #SecChat Recap: Stealth Crimeware

Last week, we hosted our monthly #SecChat on Stealth Crimeware. When it comes to building malware, cyber criminals are getting smarter – employing stealth techniques with malware able to self-replicate and evade detection for long periods of time. It can be costly for enterprises to remediate the damage done to ...

Family Safety Identity Protection

15 Tips To Better Password Security

Protect your information by creating a secure password that makes sense to you, but not to others. Most people don’t realize there are a number of common techniques used to crack passwords and plenty more ways we make our accounts vulnerable due to simple and widely used passwords. How to ...

Enterprise

Hackers vs. Hackers: The New Frontier Of Embedded Devices

If we look at the evolution of hacking, certain techniques never go out of style, but we’re at the beginning of a big shift in terms of the targets.  The threat landscape has evolved beyond PCs, tablets, and smartphones to a whole new battleground: connected devices all around us. According ...

Family Safety Identity Protection

How to Reset Your Gmail Password After Being Hacked

I finally got one of those “I’m stuck in London” emails. My friend Kate’s Gmail account was hacked, and everyone on her contact list received an email from a hacker posing as Kate: “Hi, Apologies, but I made a quick trip, to London,United Kingdom and got mugged, my bag, stolen ...

McAfee Labs

Responses to Cybercrime in Japan and France

This week the Sorbonne University and the French Department of Justice hosted a meeting, the World and Development Institute (IMODEV) International Cybercrime, CyberThreat and CyberFraud Seminar. The audience heard eminent speakers including Pierre Joxe, a Member of the French Constitutional Council and former socialist Minister of the Interior, and Jacques Godfrain, ...

Consumer Threat Notices Identity Protection

Security Threat Concerns ATM Industry

Today, there are over 2.2 million ATMs worldwide, and by 2015 there will be around 3 million. ATM skimming accounts for as much as 30% of all data theft. That’s about $350,000 in fraud every day in the United States alone, or more than a billion dollars a year. The ...

Family Safety

Fake AntiVirus Pop Ups, Mac Edition

I often hear Mac users say “Oh, I don’t have to worry about viruses. I have a Mac!” Well, unfortunately, those days have come to an end. The market share of Apple owners has tipped enough that criminal hackers are taking notice and creating malware targeting Mac users. McAfee explains ...

Family Safety Identity Protection

Most Unwanted Criminals: Phishers, Shoulder Surfers and Keyloggers

McAfee’s most unwanted criminals have included pickpockets, Trojan viruses, and ATM skimmers, dumpster divers, spies, and wireless hackers and now phishers, shoulder surfers, and keyloggers. Identity theft can happen online or on the ground to anyone with a pulse, and even to the deceased. The key is awareness, vigilance, and ...

Subscribe to McAfee Securing Tomorrow Blogs