[breadcrumb]
McAfee Labs

Slow File Infector Spies on Victims

Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents,...

Internet Security Mobile Security

What is Ransomware?

Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly...

Internet Security Privacy & Identity Protection

What is Pharming?

. For a lot of kids today, mash-ups are all the rage—whether it’s combining two videos, two songs, or two...

McAfee Labs

Exploit Kits Improve Evasion Techniques

Exploit kits are toolkits that malicious developers use to take advantage of client-side vulnerabilities, targeting web browsers and programs that...

Internet Security Family Safety Privacy & Identity Protection

What Is a Trojan Horse?

One of history’s great literary classics is Homer’s Iliad, which tells the story of the Trojan horse—the wooden horse that...

Internet Security Privacy & Identity Protection

Banks are Using Biometric Measures to Protect Against Fraud

When thinking about biometric security, one might picture Mission Impossible-like retinal scanning or fingerprint reading technology a la the iPhone...

Internet Security Privacy & Identity Protection

What is Browser Hijacking?

Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed  or check out The...

Mobile Security Family Safety Privacy & Identity Protection

What’s Your Click IQ?

The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be to have your...

McAfee Labs

Top 3 Phishing Attacks Use Similar Tricks

Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing...

McAfee Labs

BackOff Malware Uses Encryption to Hide Its Intentions

Often we see malware authors using encryption or obfuscation along with other techniques to modify the static contents of malware....

Subscribe to McAfee Securing Tomorrow Blogs