Ransomware Targets Healthcare Sector
When we develop threats predictions at McAfee, I personally like to conduct some proper research and base my statements on...
File-Hosting Site Turns Your File Into Adware
We recently received a sample from a customer and upon initial analysis it looked like a bundled software installer. Upon...
Typosquatting Attacks Alive and Well–Unfortunately
Typosquatting doesn’t get the attention that it used to, but it remains an effective means for attackers to capitalize on unsuspecting...
New TeslaCrypt Ransomware Arrives via Spam
During the last couple of weeks, McAfee Labs has observed a huge increase in spam related to Nemucod, a malicious...
Overcoming Targeted Attacks: a New Approach
Successful targeted attacks bypass security controls and typically cause significant damage to an enterprise. Damages may include reputation, monetary, and...
The Hidden Costs of Cyber Attacks
The real costs of cyber attacks are difficult to understand. The impacts of cybersecurity are terribly challenging to measure, which...
Ease of Buying Ransomware Fuels Affiliate Program
For several weeks after we released the McAfee Labs Threats Report, May 2015, in which we discussed the topic of...
Threat Actors Use Encrypted Office Binary Format to Evade Detection
This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...
‘Evoltin’ POS Malware Attacks via Macro
Over the past couple of months McAfee Labs has seen an increase in the usage of macros to deliver malware....
McAfee Labs Threats Report Highlights Ransomware, Flash Exploits, Firmware Attacks Surge
This blog post was written by Rick Simon. McAfee today released the McAfee Labs Threats Report: May 2015. Along with...