Featured Blogs
Apple iOS Attack Underscores Importance of Threat Research
The recent discovery of exploit chains targeting Apple iOS is the latest example of how cybercriminals can successfully operate malicious campaigns, undetected,...
Appearances Can Be Deceiving: Fake Anti-Virus App Dupes Users
If the laws of nature are capable of teaching us one thing it’s this: if it seems too good to...
App Store Flooded with Phony Retail Apps to Kick Off Holiday Season
The holiday season has officially kicked off, which means a number of things for many of us: seasonal cheer, quality...
App Lock: The Security System for Unprotected Mobile Apps
Lock: To fasten, to make secure, to confine or exclude by. To fix in place so that movement or escape...
App Inventor Enables the Easy Creation of Malicious Apps
In today’s increasingly connected society, heaps of new mobile apps are cropping up every day. It no longer takes a...
App Alert: What Parents Need to Know about Popular New App ‘Yellow’
Go pick up your child’s phone. Is there an app icon that is a solid, yellow square? While that little...
Apache Struts at REST: Analyzing Remote Code Execution Vulnerability CVE-2017-9805
Apache Struts, an open-source web development framework, is prone to vulnerabilities. We wrote about CVE-2017-9791 in July. The latest is...
Anyone Can Try ChatGPT for Free—Don’t Fall for Sketchy Apps That Charge You
Anyone can try ChatGPT for free. Yet that hasn’t stopped scammers from trying to cash in on it. A rash...
Another Day, Another Smart Toy Hack: This Time, It’s Fisher-Price
Toys offer a unique insight into a time, place and culture that has come and gone. While the Romans had...
Another Day, Another PoS Hack. What Makes the Micros Incident Different?
Motivated by money, cybercriminals are always chasing where it goes. That greed has now led them to where transactions are...
Anonymous App ‘After School’ Gaining Popularity with Teens
I’ve advised my kids since they were babies: If you need to hide it, you probably shouldn’t be doing it....
Announcing McAfee’s Evolved Consumer Product Portfolio
Every fall the leaves change colors, sweaters replace sundresses, and new changes are afoot. Especially for us at McAfee. In...
Andromeda Botnet Hides Behind AutoIt
Last month, I posted a blog about an increase in the use of AutoIt scripts by malware authors to carry...
Android/TimpDoor Turns Mobile Devices Into Hidden Proxies
The McAfee Mobile Research team recently found an active phishing campaign using text messages (SMS) that tricks users into downloading...
Android/LeifAccess.A is the Silent Fake Reviewer Trojan
The McAfee Mobile Research team has identified an Android malware family dubbed Android/LeifAccess.A that has been active since May 2019....
Android’s CyanogenMod Vulnerable to Zero-Day Threat
Have you installed CyanogenMod on your Android device? If yes, you’re likely vulnerable to a newly discovered zero-day threat (an...
Android Users, Beware: 60 Games in Google Play Deemed Malicious
It’s no secret that mobile games are designed to be addictive. Unfortunately, this can be to our disadvantage. It’s all...
Android Users Hit With Mobile Billing Fraud Due to Sonvpay Malware
Ever hear “Despacito” on the radio? Of course you did! It was the song of 2017 – taking over radios,...
Android Spyware Targets Security Job Seekers in Saudi Arabia
The Middle East is the new Wild West of mobile malware, especially for targeted attacks and intelligence gathering campaigns. During...
Android SpyNote attacks electric and water public utility users in Japan
Authored by Yukihiro Okutomi McAfee’s Mobile team observed a smishing campaign against Japanese Android users posing as a power and...
Android Phones Vulnerable to Loss of Data, Apps
Recently security researcher Ravi Borgaonkar discussed a vulnerability that caused a Samsung Galaxy SIII to return to a factory reset...
Android Phishing Scam Using Malware-as-a-Service on the Rise in India
Authored by ZePeng Chen and Wenfeng Yu McAfee Mobile Research Team has observed an active scam malware campaign targeting Android...
Android Master-Key Malware Already Blocked by McAfee Mobile Security
The Android Master Key vulnerability, which was first reported by BlueBox Security, has been big news this month. McAfee explained...
Android Malware Spreads Through QR Code
Last week, there was quite a buzz in the mobile-malware researchers community about a new Android malware. It came to...
Android Malware Promises Video While Stealing Contacts
Recently we discovered a new Android Trojan in the official Google Play market that displays a video downloaded from the...
Android Malware Pairs Man-in-the-Middle With Remote-Controlled Banking Trojan
Based on the Android malware that we’ve seen so far, one of the principal motivations to develop and spread malware...
Android Malware Goes Bollywood
We already know that mobile malware is growing at a fantastic rate, but we now see a new trend that...