Are We Really Expressing Ourselves on Social Media, Or Are We Too Scared?
When social media really took off about 10 years ago, I think many of us assumed that it might just...
Ransomware, PUPs, Vulnerabilities: a Look at What’s Putting You at Risk
Every quarter McAfee releases a report on the cybersecurity issues confronting consumers, business partners, and the public. Produced by McAfee...
What is a Remote Administration Tool (RAT)?
Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I...
The Rise of Backdoor-FCKQ (CTB-Locker)
By Raj Samani (@Raj_Samani) and Christiaan Beek (@ChristiaanBeek) In the McAfee Labs Threats Report published in November 2014, Senior Vice...
Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own
Director Michael Mann’s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity...
Slow File Infector Spies on Victims
Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents,...
What is Ransomware?
Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly...
What is Pharming?
. For a lot of kids today, mash-ups are all the rage—whether it’s combining two videos, two songs, or two...
Exploit Kits Improve Evasion Techniques
Exploit kits are toolkits that malicious developers use to take advantage of client-side vulnerabilities, targeting web browsers and programs that...
What Is a Trojan Horse?
One of history’s great literary classics is Homer’s Iliad, which tells the story of the Trojan horse—the wooden horse that...