[breadcrumb]
Mobile Security

How ‘Switcher’ Malware Moves an Attack from Your Phone to Your Router

Why attack one device when you can get inside an entire network and manipulate every device connected to it? That’s...

Internet Security Privacy & Identity Protection Security News

Medical IoT Manufacturers Given Guidelines on Lifelong Devices Security, Courtesy of FDA

2016 appears to have one more gift for us before calling it a year, and this time it involves both...

McAfee Labs

Floki Bot a Sensation With International Cybercriminals

Floki Bot, new financial malware, is popular with English-, Portuguese-, and Russian-speaking underground criminal markets, winning over cybercriminals with new...

Internet Security Mobile Security

Super Mario Run Has Cybercriminals Sprinting to Exploit the Hype

Nintendo, one of the most popular gaming companies of the past two decades, has finally released its first game exclusively...

McAfee Labs

An Overview of Malware Self-Defense and Protection

Many malware authors spend a great deal of time and effort to develop complex code. Their success depends on a...

Internet Security Privacy & Identity Protection

Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up

  The 2002 horror film, The Ring, had an interesting play on its genre: socialize the scares — at least...

Mobile Security Privacy & Identity Protection

Shopaholics: Beware of Risky Wi-Fi

As the days grow shorter and twinkly lights pop up on houses lining the block, one thing is clear: the...

McAfee Labs

“Trojanization” of Legit Apps on the Rise

McAfee today released its McAfee Labs Threats Report: December 2016. The report’s third key topic illustrates how attackers are creating...

McAfee Labs

2016: A Year at Ransom

This week’s McAfee Labs Threats Report: December 2016 provides an overview of how ransomware has evolved over the course of 2016, and...

Internet Security

Millions Possibly Affected by Newly Discovered Stegno Malvertising

When it comes to deception, cybercriminals have many options at their disposal. There’s phishing, where crooks posing as an authority...

Subscribe to McAfee Securing Tomorrow Blogs