Featured Blogs
Past Election Scams: Lessons Learned and Current Threats
Elections are the bedrock of democratic societies, but historically, they have been vulnerable to various forms of manipulation and fraud....
Pastebin Shares Botnet Source Code
Few days back, we found another Pastebin entry that contains a source which looks to be malicious botnet code. As...
Patch Now: Simple Office ‘Protected View’ Bypass Could Have Big Impact
Protected View is a security feature of Microsoft Office. According to research from MWR Labs, Protected View mode is a strong...
Pay-Per-Install Company Deceptively Floods Market with Unwanted Programs
For the past 18 months, McAfee Labs has been investigating a pay-per-install developer, WakeNet AB, responsible for spreading prevalent adware...
PayPal Users: Here’s What You Need to Know About the New Phishing Scam
It’s the season of giving, which means internet scams are practically everywhere, as cybercriminals are trying to trick eager holiday...
PC Gamers (and Parents of Gamers) Rejoice!
Of all the pastimes that took off during the pandemic, it’s not surprising that online gaming was one of them....
PDF Phishing: Beyond the Bait
By Lakshya Mathur & Yashvi Shah Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential...
Peeling Back the Layers of RemcosRat Malware
Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email....
Perception vs. Reality: Facebook Anonymous Login Feature
Perception plays a huge role in many aspects of daily life. However, the reality of something is often not as...
Periodic Connections to Control Server Offer New Way to Detect Botnets
A number of recent botnets and advanced threats use HTTP as their primary communications channel with their control servers. McAfee...
Personal and Professional Development From Home
Personal and Professional Development from Home Like so many of us, I’m doing my best to look forward. While everyone’s...
Petya is Here, And It’s Taking Cues from WannaCry
Just over a month after the infamous WannaCry attack, a new worldwide cyberattack is here again. Its name is Petya, or Petwrap, it’s...
Phishing Attack Replaces Android Banking Apps With Malware
Mobile devices are also increasingly being used to manage a critical and important asset for all of us: our money....
Phishing Attacks Employ Old but Effective Password Stealer
A few months ago we received a sample from a customer that turned out to be a password stealer (PWS). One...
Phishing Campaigns featuring Ursnif Trojan on the Rise
Authored by Jyothi Naveen and Kiran Raj McAfee Labs have been observing a spike in phishing campaigns that utilize Microsoft...
Phishing Goes Mobile: New Android Malware Hits Google Play
Sometimes, things just aren’t as they seem to be. For example, last year, Google Play hosted a round of mobile...
Phishing Scam Targets Walmart.com Online Customers
Late last week, Walmart alerted the public to an email-based scam that used the company’s name (misspelled as “Wallmart”) to...
Phishing Threat Uses UTF-8 BOM in ZIP Signature to Evade Detection
This blog was written by Sanchit Karve. Last week, we noticed thousands of malware files in the wild that employ...
Phishing Android Malware Targets Taxpayers in India
Authored by ChanUng Pak McAfee’s Mobile Research team recently found a new Android malware, Elibomi, targeting taxpayers in India. The malware steals sensitive financial and private information via phishing by pretending...
Phony Adobe Flash Update Hosts Malware, Targets Apple Users
Computer maintenance is often a simple equation: avoid behavior that might land you a virus, and keep your software up-to-date....
Pickpocketing – Digital Style
Gone are the days when thieves would physically steal your wallet. Instead, they are using sophisticated techniques to steal your personal information and drain your bank accounts without you even realizing it. This article aims to shed light on digital pickpocketing, its impacts on your digital assets, and measures to ...
Picture Perfect: How to Help Your Teen Survive an ‘Instagram-Ready’ World
As the mom of a teenage girl, I have a front row seat to the good, the bad, and the...
Picture to Pedophile: The Danger of Instagram and Kik Messenger
Sometimes it might feel overwhelming to keep up with the latest social trend for your kids, but it’s important to...
Pirate Versions of Popular Apps Infiltrate Google Play via Virtualization
The McAfee Mobile Research team recently found pirated applications of popular apps distributed on the Google Play store. A pirated...
Plasma HTTP Botnet Steals Passwords From Chrome, FileZilla
Last year we reported on the Athena HTTP botnet, which targets Windows XP systems, mostly for distributed denial-of-service attacks. Now...
Play The Game – Tips and Tricks for Safe Online Gaming
This blog was written by Jessica Brookes. When I was child, gaming was all joysticks and arcades. Now, it’s all...
Plug with Caution! How to Stop Hackers from Stealing More than Battery Power
There’s nothing like that stressful moment when you look to your phone and see a red battery and a low...