Featured Blogs
Malicious Utility Can Defeat Windows PatchGuard
In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at...
Malicious Websites – The Web is a Dangerous Place
McAfee’s latest Threats Report shows a growth in malicious websites replacing botnets as the primary infection mechanism. This means that...
Malware Behaves Oddly in Automated Analysis Environment
While testing malware recently, we got some logs from our automated analysis system showing a few samples that are only...
Malware Disguised as Java Update: Careful What You Download!
All too often, cyber attacks are crimes of opportunity. This was exactly the case when late last week, hackers created...
Malware Hides in Installer to Avoid Detection
At McAfee Labs we recently observed various threat families using the Nullsoft Scriptable Install System (NSIS). This practice is not...
Malware Manipulates Procedure Prologue and Epilogue to Evade Security
Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers,...
Malware Mines, Steals Cryptocurrencies From Victims
How’s your Bitcoin balance? Interested in earning more? The value of cybercurrency is going up. One way to increase your...
Malware Mystery: JS/Nemucod Downloads Legitimate Installer
JS/Nemucod is the detection name given to a family of malicious JavaScript downloaders that have appeared in spam campaigns since last year....
Malware on Google Play Targets North Korean Defectors
Earlier this year, McAfee researchers predicted in the McAfee Mobile Threat Report that we expect the number of targeted attacks on mobile devices to increase due to their ubiquitous growth combined with the sophisticated tactics used by malware authors.
Malware Spreads Through Facebook Tag Scam
McAfee has recently observed a malware spreading through Facebook. This type of malware is not new, but it keeps evolving...
Malware Takes Advantage of Windows ‘God Mode’
Microsoft Windows has hidden an Easter Egg since Windows Vista. It allows users to create a specially named folder that...
Manage your data this Data Privacy Day
You know when Valentine’s Day is, and on which day Friendship Day falls, but do you know the day in...
Marcher Malware Uses Both Credential and Credit Card Phishing to Steal Financial Data
Actors turned models turned singers — pretty much the definition of a “triple threat” in the entertainment industry. However, the...
Massive Law Enforcement Operation Tells two Malware Variants it’s Game Over
On Monday, the United States Department of Justice announced an international law enforcement effort to take out a massive botnet—a...
Massive Malaysian Data Breach Compromises Over 46 Million Phone Numbers
There are data breaches that impact an entire customer group, or even a certain state. And then there are data...
Massive Security Flaw for High Sierra Macs Emerges
When it comes to cybersecurity, we’ve seen our fair share of device flaws. Sometimes, hackers leverage these vulnerabilities to execute...
MasterCard Wants to Verify by Selfies and Fingerprints! The Ripple Effects of Biometrics?
We often take daily conveniences for granted, and the credit card is no exception. These pieces of plastic allow us...
McAfee 2022 Consumer Mobile Threat Report
We’re excited to bring you the latest edition of the McAfee 2022 Consumer Mobile Threat Report. After all, when you...
McAfee 2023 Consumer Mobile Threat Report
Smartphones put the proverbial world in the palm of your hand—you pay with it, play with it, keep in touch...
McAfee 2023 Hacker Celebrity Hot List – Why Hackers Love Ryan Gosling so Much
Hackers love Ryan Gosling. In fact, hackers use his name as bait more than any other celebrity. With that, the...
McAfee 2023 Threat Predictions: Evolution and Exploitation
As 2022 draws to a close, the Threat Research Team at McAfee Labs takes a look forward—offering their predictions for...
McAfee Adds Flash Exploit Detection to NSP 8.2
Adobe Flash vulnerabilities and exploits have worried users and security professionals for many years. The situation today remains serious. A...
McAfee AMSI Integration Protects Against Malicious Scripts
This blog describes how the AMSI (Antimalware Scan Interface) is used within the various McAfee products, and highlights some of the malware we are able to detect with it.
McAfee and Intel Collaborate to Combat Deepfakes with AI-Powered Deepfake Detection
In a world where deepfake scams and misinformation are on the rise, McAfee has announced significant enhancements to its AI-powered...
McAfee and Telstra Partner to Bring Privacy, Identity and Security to Australian Customers
McAfee announces a partnership that will grant new and existing Telstra customers easy access to McAfee’s leading security solutions to...
McAfee and the Security Innovation Alliance: Together is Power
New McAfee is here. We turn the page in the next chapter of this company’s story. It’s one we have...
McAfee ATR Aids Police in Arrest of Rubella & Dryad Office Macro Builder
Everyday thousands of people receive emails with malicious attachments in their email inbox. Disguised as a missed payment or an...