How ‘Switcher’ Malware Moves an Attack from Your Phone to Your Router
Why attack one device when you can get inside an entire network and manipulate every device connected to it? That’s...
Medical IoT Manufacturers Given Guidelines on Lifelong Devices Security, Courtesy of FDA
2016 appears to have one more gift for us before calling it a year, and this time it involves both...
Floki Bot a Sensation With International Cybercriminals
Floki Bot, new financial malware, is popular with English-, Portuguese-, and Russian-speaking underground criminal markets, winning over cybercriminals with new...
Super Mario Run Has Cybercriminals Sprinting to Exploit the Hype
Nintendo, one of the most popular gaming companies of the past two decades, has finally released its first game exclusively...
An Overview of Malware Self-Defense and Protection
Many malware authors spend a great deal of time and effort to develop complex code. Their success depends on a...
Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up
The 2002 horror film, The Ring, had an interesting play on its genre: socialize the scares — at least...
Shopaholics: Beware of Risky Wi-Fi
As the days grow shorter and twinkly lights pop up on houses lining the block, one thing is clear: the...
“Trojanization” of Legit Apps on the Rise
McAfee today released its McAfee Labs Threats Report: December 2016. The report’s third key topic illustrates how attackers are creating...
2016: A Year at Ransom
This week’s McAfee Labs Threats Report: December 2016 provides an overview of how ransomware has evolved over the course of 2016, and...
Millions Possibly Affected by Newly Discovered Stegno Malvertising
When it comes to deception, cybercriminals have many options at their disposal. There’s phishing, where crooks posing as an authority...