Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog
Enterprise

Cloud Computing for Critical Infrastructure

Cloud computing continues to be a hot topic. But so what if people are talking about it, who is actually adopting it? One of the questions I have been asking myself is, ‘Will cloud be adopted for critical infrastructure? And what is the security perspective on this? Naturally a blog ...

Consumer Threat Reports

Love, Relationships, and #SextRegret: It’s Time to Take Back the Web

What would you do if someone threatened to post risqué photos of you on the Internet? According to a new McAfee survey, 68.7% of us have used a smartphone to send personal or intimate text messages, emails, or photos – a habit that could put your privacy (and even your ...

McAfee Labs

Labs Paper Looks ‘Inside the World of the Citadel Trojan’

Zeus “banking” malware and its variants have been making headlines in recent months. One variant, the Citadel Trojan, has now taken the spotlight with the news of its withdrawal from the open crimeware market. Recently the author of Citadel, Aquabox, has been banned from a large online forum that sells ...

McAfee Labs

IPS Countermeasures Fight Obfuscation, Evasion

Before the advent of intrusion detection systems (IDS) and intrusion prevention systems (IPS), firewalls served as the primary technology to help organizations block unwanted traffic. With application-layer protocols lacking detection, attackers were able to disguise malicious traffic and remotely exploit applications. To stop these kinds of attacks, the security industry ...

Mobile and IoT Security

Apps Tracking Your Location: Friendly or Creepy?

There is no denying the fact that the world has gone wireless. With the explosion of smartphones and the “bring your own device” (BYOD) movement, it is not hard to believe that more than 85% of American adults own a mobile phone and over half of them use them access ...

McAfee Labs

Botnet Control Servers Span the Globe

McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet.  With millions of McAfee endpoints and network security appliances sending information to McAfee Global Threat Intelligence (GTI) in the cloud, coupled with a vast collection of malicious binary and proactive research, McAfee Labs has a clear view ...

Consumer Threat Reports

Malware Disguised as Java Update: Careful What You Download!

All too often, cyber attacks are crimes of opportunity. This was exactly the case when late last week, hackers created a fake website to fool users into downloading a virus instead of the latest version of Java. As many of you read here in the blog, Oracle recently released a ...

McAfee Labs

The Future of Hacktivism and Anonymous

After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of a possible slowdown in Anonymous activity this year. Some readers agreed, while others were more skeptical. With this blog, I will attempt to explain these positions. The Anonymous signature Today, ...

Consumer Threat Reports

How to Protect Your Devices from a Fast Spreading Java Virus

Last week, a new security issue surfaced for a popular programming language known as Java. This Java security issue is classified as a zero-day threat, and it spreads malicious files to unprotected computers. A zero-day threat is an attack that exploits a previously unknown vulnerability in a computer application (in this case Java), ...

McAfee Labs

Java Zero-Day Vulnerability Pushes Out Crimeware

This blog was updated on January 14. See the end of the file. A new Java zero-day vulnerability is spreading malicious files to infect unprotected users. The threat is dangerous: Just browsing a malicious page or clicking a malicious link in spam is enough to cause an infection when combined ...

Subscribe to McAfee Securing Tomorrow Blogs