[breadcrumb]
McAfee Labs

File-Hosting Site Turns Your File Into Adware

We recently received a sample from a customer and upon initial analysis it looked like a bundled software installer. Upon...

McAfee Labs

Cyber Criminals Gain in Sophistication With Integrity Attacks

One constant in cybersecurity is the continual rise of sophistication and creativity of attackers. In 2016, we will see a...

McAfee Labs

Updated BlackEnergy Trojan Grows More Powerful

In late December, a cyberattack caused a power outage in the Ukraine, plunging hundreds of thousands of citizens into darkness...

McAfee Labs

Typosquatting Attacks Alive and Well–Unfortunately

Typosquatting doesn’t get the attention that it used to, but it remains an effective means for attackers to capitalize on unsuspecting...

McAfee Labs

New TeslaCrypt Ransomware Arrives via Spam

During the last couple of weeks, McAfee Labs has observed a huge increase in spam related to Nemucod, a malicious...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

Learn How to Spot a Phishy Email and Stay Safe

This blog post was written by Bruce Snell. One piece of advice I always give (after update, update, update) is...

McAfee Labs

Rovnix Downloader Updated with SinkHole and Time Checks

McAfee Labs has found that the latest Rovnix downloader now comes with the capability to check for the sinkholing of...

McAfee Labs

Overcoming Targeted Attacks: a New Approach

Successful targeted attacks bypass security controls and typically cause significant damage to an enterprise. Damages may include reputation, monetary, and...

McAfee Labs

The Hidden Costs of Cyber Attacks

The real costs of cyber attacks are difficult to understand. The impacts of cybersecurity are terribly challenging to measure, which...

McAfee Labs

A Dummies Guide to ‘Insider Trading’ via Botnet, Part 2

This post, the second of two parts, was written by Christiaan Beek, Raj Samani, and Shane Shook.  In our first post,...

Subscribe to McAfee Securing Tomorrow Blogs