Cerber Ransomware Evades Detection With Many Components
This blog was co-written by Sapna Juneja. Cerber is a quickly evolving type of malware called crypto-ransomware. Cerber encrypts files...
Banned Chinese Qvod Lives on in Malicious Fakes
Qvod used to be a popular video player and developer in China. Due to piracy allegations and a threatened fine,...
Mirai Botnet Creates Army of IoT Orcs
This post was based on analysis by Yashashree Gund and RaviKant Tiwari. There is a lot of speculation in the...
App Alert: What Parents Need to Know about Popular New App ‘Yellow’
Go pick up your child’s phone. Is there an app icon that is a solid, yellow square? While that little...
Cybercriminals Claim They Have ‘Millions’ of iCloud Credentials, but Likelihood Is Low.
A lot of people love to play poker for the thrill and entertainment of sheer luck. For some, however, it’s...
How to Identify Three Common Phishing Scams
Time and time again, phishing scams have gotten the best of us. Take the recent W-2 attacks that are everywhere...
Spora Ransomware Infects ‘Offline’—Without Talking to Control Server
Spora is a ransomware family that encrypts victims’ files and demands money to decrypt the files. It has infected many...
Macro Malware Targets Macs
Macro malware has been spreading for years. New techniques arise all the time to hide malicious code and thus increase...
Analyzing KillDisk Ransomware, Part 2: Variants and Screen Unlocking
This blog post was written by Sudhanshu Dubey. At McAfee Labs we recently analyzed the ransomware KillDisk. In part 1 of...
How Much Control Do You Really Have Over Your Family’s Connected Life?
If you took an inventory of your family’s connected devices, would you have three or four devices, or would it...