Consumer Mobile and IoT Security

The Top 5 Scariest Mobile Threats

Halloween has to be one of my favorite holidays of the year. Creative costumes, buckets of candy, and pumpkin spice lattes make All Hallows’ Eve a memorable event for people of all ages. But what I love most about Halloween is the traditions associated with it: pumpkin carving, trick or ...

Consumer Threat Reports

Infected Minecraft Apps Could Potentially Turn Over 2 Million Android Devices Into a Botnet Army

We all love a good game, especially those that allow us to create and innovate with the touch of our fingertips. That’s why the video game Minecraft, which allows players to build constructions out of textured cubes, has grown in popularity. It’s become so popular, in fact, that there’s even ...

McAfee Labs

Android Click-Fraud App Repurposed as DDoS Botnet

The McAfee Mobile Research Team tracks the behavior of Android click-fraud apps. We have detected multiple implementations, including recent examples on Google Play in 2016 and Clicker.BN last month. These threats are characterized by a common behavior: They appear innocuous but in the background they perform HTTP requests (simulating clicks) ...

Consumer Mobile and IoT Security

The Do You Knows of DDoS Attacks

“Where’s my phone?” In a blink of an eye, my home is suddenly flipped upside down—couch cushions overturned, drawers – askew and papers shuffled. After a few repeating buzzes I realize that it’s right under my nose. Relief floods my body. How could I last a day without my phone? ...

McAfee Labs

Mirai, BrickerBot, Hajime Attack a Common IoT Weakness

This blog post was written by Rick Simon. We know that devices in the Internet of Things make enticing targets for attack. They are often insecure and can act as open windows into trusted networks. Cybercriminals are capitalizing on that more and more each day, gathering hundreds of thousands of ...

McAfee Labs

Mirai Botnet Creates Army of IoT Orcs

This post was based on analysis by Yashashree Gund and RaviKant Tiwari. There is a lot of speculation in the news about surveillance from home appliances, personal electronics, or other Internet of Things (IoT) devices. Although some statements may be hyperbole, we know that these devices, in homes and offices, ...

Enterprise

TinyNuke May be a Ticking Time Bomb

On March 12th,  2017 a low-profile developer uploaded to Github a mostly functional Botnet code named TinyNuke. The user, Aainz, uses his real name in connection with this code. It’s not unusual for security professionals or hobbyist to release proof of concept code to enable the industry to learn from ...

McAfee Labs

Analyzing a Fresh Variant of the Dorkbot Botnet

This blog post was written by Sudhanshu Dubey. At McAfee Labs, we have recently observed a new variant of the Dorkbot botnet. Dorkbot is a well-known bot, famous for its various capabilities including backdoor, password stealing, and other malicious behavior. Dorkbot relies on social networking as its infection vector. In ...

Family Safety

How Much Control Do You Really Have Over Your Family’s Connected Life?

If you took an inventory of your family’s connected devices, would you have three or four devices, or would it be more like 30? You might be surprised how connected your family has become. The gradual, gadget creep is real, as are the security risks that come with it. While the ...

Consumer Threat Reports

What’s the Deal with Mirai? A Rundown on one of the Biggest Botnets

Every once in a while, a type of malware become so effective and prevalent that it dominates headlines for weeks. We have one type of malware fitting this description today. It is the Mirai malware, a malicious program that infects a plethora of internet-connected devices that fall under the Internet ...

Subscribe to McAfee Securing Tomorrow Blogs