Teslacrypt Joins Ransomware Field
A newly crafted ransomware, Teslacrypt, has arrived in the malware genre that encrypts user files using AES encryption and demands...
Attacks On Indian Organizations Continue – More Exploits Focused On Events
In November last year, McAfee Labs researchers reported about Operation Mangal, an ongoing targeted attack campaign against several Indian domestic...
Amazon Gift Card Malware Spreading via SMS
McAfee Labs recently published its Hacking the Human OS report, which details a number of ways in which cybercriminals rely...
Five Ways the Internet of Things Can Put Your Security at Risk
Sometimes a new technology comes along that’s so promising, so revolutionary, that, over time, future citizens consider the innovation to...
What is a Remote Administration Tool (RAT)?
Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I...
Steamstealer Attacks Victims via Chat
During the last few months, McAfee Labs has seen an increase in Steamstealer samples. The following chart shows the recent...
What is a Rootkit?
A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit...
The Rise of Backdoor-FCKQ (CTB-Locker)
By Raj Samani (@Raj_Samani) and Christiaan Beek (@ChristiaanBeek) In the McAfee Labs Threats Report published in November 2014, Senior Vice...
Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own
Director Michael Mann’s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity...
Don’t Believe These 6 Mobile Security Myths
Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits...