Unfolding the Mystery of Cerber Ransomware’s Random File Extension
This blog post was written by Sudhanshu Dubey. In an earlier blog, we discussed the evolution of the popular Cerber...
Leading E-Commerce Platform Magento Cracked by Cybercriminals
There’s a modern joy we’re all too familiar with. We’ve all made an online purchase while reclining in pajamas, computer...
Password-Protected Attachment Serves Ransomware
Attacks by macro malware carrying ransomware are growing, as we have recently reported. Since early March we have seen macro...
Ransomware Variant XTBL Another Example of Popular Malware
We have seen a huge increase in ransomware during the past couple of years. At McAfee Labs we have recently...
Android Banking Trojan Asks for Selfie With Your ID
In the first half of 2016 we noticed that Android banking Trojans had started to improve their phishing overlays on legitimate financial...
How Searching for Funny Online Can Wreck Your Family Tech
Perhaps the most alarming thing about cybercriminals is that they know us so well. They study human behavior. They study...
Most Dangerous Celebrities 2016: #RT2Win a Red Carpet-Worthy Prize
Everybody loves some celebrity gossip once in a while. Whether you sift through tabloids in the checkout aisle, or bookmark...
How to protect your smart home from security threats
This blog post was written by Nick Viney. Have you downloaded the new iOS10 on your iPhone? If you have,...
Cybercriminals Breach Yahoo, Impacting 500 Million Users
When it comes to data breaches there are hits and there are misses. And then there are hits. Today, there...
Cryptocurrencies a Target for Cybercriminals, Part 2: Social Platforms Come Next
One target of cybercriminals is cryptocurrencies, which hold tremendous wealth but are largely anonymous. This limits the attack surface mostly...