[breadcrumb]
McAfee Labs

Hacktivists Turn to Phishing to Fund Their Causes

At McAfee we recently observed a phishing campaign targeting Apple account holders. The link directed the user to a compromised WordPress...

McAfee Labs

TeslaCrypt Ransomware Arrives via Neutrino Exploit Kit

This post was written by Sriram P. and Varadharajan Krishnasamy. TeslaCrypt is a ransomware family that encrypts files and extorts money...

Internet Security Privacy & Identity Protection

How Keyless Entry Lets Cybercriminals Hack Your Connected Car

There’s a certain sort of absurd-ism to Christine, the novel-slash-movie released by Stephen King and John Carpenter in 1983. In...

McAfee Labs

Criminals are Getting Excited for Tax Filing Season

  Cybercriminals are plotting to take advantage of tax season, by fraudulently impersonating consumers and scamming Americans. For the citizens...

McAfee Labs

Macro Malware Associated With Dridex Finds New Ways to Hide

Macro malware is on the upswing and cybercriminals are always searching for new ways to deceive users and evade detection....

McAfee Labs

Trillium Toolkit Leads to Widespread Malware

Any aspiring cybercriminal can buy one of many malicious toolkits to craft a downloader and distribute malware. After a time these downloaders...

McAfee Labs

A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress

More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss...

McAfee Labs

Targeted Ransomware No Longer a Future Threat

This post was written by Christiaan Beek and Andrew Furtak. In 2015, McAfee investigated a ransomware campaign that targeted the...

Internet Security Privacy & Identity Protection

MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters

Every year, more and more words are making it into the English dictionary. The next one to make its debut...

McAfee Labs

Malicious Forums Turn Amateur Hackers Into Cybercriminals

Security researchers are aware of forums that offer downloads of malicious software such as keyloggers and remote access tools. Some inexperienced...

Subscribe to McAfee Securing Tomorrow Blogs