[breadcrumb]
Family Safety

An Aware Child is Safer Online

A Parent’s Handy Primer on Cyber Vocabulary – Part IV Aaaaaand, we are back! *drum rolls* This week’s topic is...

McAfee Labs

Threat Actors Use Encrypted Office Binary Format to Evade Detection

This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...

McAfee Labs

Brazilian Banking Malware Hides in SQL Database

Spam is a plague that has given headaches to system administrators and users for years. A lot of spam tries...

Internet Security Privacy & Identity Protection

What is a Rootkit?

A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit...

Mobile Security

Don’t Believe These 6 Mobile Security Myths

Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits...

McAfee Labs

Trailing the Trojan njRAT

One Trojan that just won’t go away is the remote access tool njRAT. Microsoft recently took down a leading domain...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Spot and Protect Yourself from Fake Antivirus Software

Most of you know how important it is to have security software on your computers to stay protected from viruses, malware,...

McAfee Labs

Examining Your Very Own Sefnit Trojan

Most malware is created for economic purposes. To name just a few of our reports and blogs on this topic,...

McAfee Labs

In Memory of Peter Szor

Nov. 20: Update with details of memorial service at the end of this post. Earlier this week the security industry...

McAfee Labs

Botnet Control Servers Span the Globe

McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet.  With millions of McAfee endpoints...

Subscribe to McAfee Securing Tomorrow Blogs