Marcher Malware Uses Both Credential and Credit Card Phishing to Steal Financial Data
Actors turned models turned singers — pretty much the definition of a “triple threat” in the entertainment industry. However, the...
Pirate Versions of Popular Apps Infiltrate Google Play via Virtualization
The McAfee Mobile Research team recently found pirated applications of popular apps distributed on the Google Play store. A pirated...
Expiro Malware Is Back and Even Harder to Remove
File infector malware adds malicious code to current files. This makes removal tricky because deleting infections results in the loss...
Infected Minecraft Apps Could Potentially Turn Over 2M Android Devices Into a Botnet Army
We all love a good game, especially those that allow us to create and innovate with the touch of our...
5 Tips for Avoiding Android Malware
The ubiquity of mobile phones has created a unique opportunity for cybercriminals. They now have a way of accessing both...
McAfee Labs: Faceliker Surge Manipulates Facebook “Likes” to Promote News, Other Content
Criminals excel in manipulating the trust within human relationships, particularly as individuals project themselves into digital realms such as social...
What Is Script-Based Malware? How to Stay Protected from This Cyberthreat
When you hear the word “script,” you probably think of either a movie script, or JavaScript. Though most of us...
How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family
Like stockbrokers watch the market, cybercriminals keep an eye on the public’s latest obsessions. And, once they spot a trend...
Most Dangerous Celebrities 2017: #RT2Win a Hollywood Worthy Prize
“Hey hey, you you!” Did you hear that we released our 2017 Most Dangerous Celebrities List? This year marks the...
Emotet Trojan Acts as Loader, Spreads Automatically
Since the middle of July, McAfee has observed new updates of the Emotet, a Trojan that was first discovered in...