Featured Blogs
Phishing Attacks Employ Old but Effective Password Stealer
A few months ago we received a sample from a customer that turned out to be a password stealer (PWS). One...
Phishing Attack Replaces Android Banking Apps With Malware
Mobile devices are also increasingly being used to manage a critical and important asset for all of us: our money....
Petya is Here, And It’s Taking Cues from WannaCry
Just over a month after the infamous WannaCry attack, a new worldwide cyberattack is here again. Its name is Petya, or Petwrap, it’s...
Personal and Professional Development From Home
Personal and Professional Development from Home Like so many of us, I’m doing my best to look forward. While everyone’s...
Periodic Connections to Control Server Offer New Way to Detect Botnets
A number of recent botnets and advanced threats use HTTP as their primary communications channel with their control servers. McAfee...
Perception vs. Reality: Facebook Anonymous Login Feature
Perception plays a huge role in many aspects of daily life. However, the reality of something is often not as...
Peeling Back the Layers of RemcosRat Malware
Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email....
PDF Phishing: Beyond the Bait
By Lakshya Mathur & Yashvi Shah Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential...
PC Gamers (and Parents of Gamers) Rejoice!
Of all the pastimes that took off during the pandemic, it’s not surprising that online gaming was one of them....
PayPal Users: Here’s What You Need to Know About the New Phishing Scam
It’s the season of giving, which means internet scams are practically everywhere, as cybercriminals are trying to trick eager holiday...
Pay-Per-Install Company Deceptively Floods Market with Unwanted Programs
For the past 18 months, McAfee Labs has been investigating a pay-per-install developer, WakeNet AB, responsible for spreading prevalent adware...
Patch Now: Simple Office ‘Protected View’ Bypass Could Have Big Impact
Protected View is a security feature of Microsoft Office. According to research from MWR Labs, Protected View mode is a strong...
Pastebin Shares Botnet Source Code
Few days back, we found another Pastebin entry that contains a source which looks to be malicious botnet code. As...
Past Election Scams: Lessons Learned and Current Threats
Elections are the bedrock of democratic societies, but historically, they have been vulnerable to various forms of manipulation and fraud....
Passwords – It’s Not Cool to Share
Rightly or wrongly, being part of the ‘it’ crowd at school is what every tween and teen yearns for. Being...
Passwords in Real Life: Don’t be Lazy
It’s tough being responsible sometimes. And managing responsibilities for what is precious in your life usually takes a little extra...
Passwords are Like Toothbrushes – Not to Be Shared!!
Sometimes, I feel that my brain is full! We are all bombarded with information on so many fronts and quite...
Password-Protected Attachment Serves Ransomware
Attacks by macro malware carrying ransomware are growing, as we have recently reported. Since early March we have seen macro...
