Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog
Security Operations

Advanced Malware Protection with Network Security Platform

McAfee Network Security Platform customers have benefited from malware protection for some time now. Most customers already use McAfee Global Threat Intelligence (GTI), which has been available since the 6.0 release. The largest and most used reputation service, with over 64 Billion queries per day, GTI classifies files as either ...

Family Safety

This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too

This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too Love is in the air, for Valentine’s Day is near… And why just Valentine’s Day? There are a series of “Days” devoted to lovers, viz. Rose day, Propose Day and Chocolate Day!! So how ...

McAfee Labs

Fake Cleaning Apps in Google Play: an AutoRun Attack and More

Almost exactly one year ago, Google announced the addition of a “new layer to Android security,” a service codenamed Bouncer that was intended to provide automated scanning of the Android Market for potentially malicious software. However, as my colleague Jimmy Shah wrote in a previous blog post, Bouncer has not ...

Family Safety Identity Protection Mobile and IoT Security

Simplify and Secure Your Passwords

It seems that almost every site on the Web requires a password. At least twice a week, I get an email from someone who wants me to join yet another site, which requires yet another username and password. You can cop out and use the same username and password combination, but ...

McAfee Labs

Evasion Techniques: Encoded JavaScript Attacks PDF Files

Last week I kicked off a series of blogs with a discussion of how an effective IPS solution can fight obfuscation techniques by malware. This week, we’ll look at how JavaScript poses a danger when combined with PDF files. One of the easiest and most powerful ways to customize PDF ...

Family Safety Identity Protection Mobile and IoT Security

Do You Share Passwords with Your Partner?

Do you? I do and I’ve been doing it since I said “I do.” And if you are married or at least in a committed lifelong relationship, knowing each other’s passwords is probably expected. Today, sharing passwords has become a sign of commitment, a signal of love and devotion, like ...

Enterprise

Cloud Computing for Critical Infrastructure

Cloud computing continues to be a hot topic. But so what if people are talking about it, who is actually adopting it? One of the questions I have been asking myself is, ‘Will cloud be adopted for critical infrastructure? And what is the security perspective on this? Naturally a blog ...

Consumer Threat Notices

Love, Relationships, and #SextRegret: It’s Time to Take Back the Web

What would you do if someone threatened to post risqué photos of you on the Internet? According to a new McAfee survey, 68.7% of us have used a smartphone to send personal or intimate text messages, emails, or photos – a habit that could put your privacy (and even your ...

McAfee Labs

Labs Paper Looks ‘Inside the World of the Citadel Trojan’

Zeus “banking” malware and its variants have been making headlines in recent months. One variant, the Citadel Trojan, has now taken the spotlight with the news of its withdrawal from the open crimeware market. Recently the author of Citadel, Aquabox, has been banned from a large online forum that sells ...

McAfee Labs

IPS Countermeasures Fight Obfuscation, Evasion

Before the advent of intrusion detection systems (IDS) and intrusion prevention systems (IPS), firewalls served as the primary technology to help organizations block unwanted traffic. With application-layer protocols lacking detection, attackers were able to disguise malicious traffic and remotely exploit applications. To stop these kinds of attacks, the security industry ...

Subscribe to McAfee Securing Tomorrow Blogs