Featured Blogs
Hot Security Market Needs Smart Engagements
Industry analysts vary on their opinions on the growth and health of the technology market. Depending on which report you...
Bing.VC Hijacks Browsers Using Legitimate Applications
Browser hijackers are a type of malware that modifies a web browser’s settings without the user’s permission. Generally a browser hijacker...
This Year at Black Hat: Danger Drones and Thermostat Ransomware
This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it...
Obfuscated Malware Discovered on Google Play
The McAfee Labs Mobile Malware Research team found early this week on Google Play a set of malware published by...
Banload Trojan Targets Brazilians With Malware Downloads
McAfee Labs has recently encountered new variants of the Banload Trojan. Banload has been around since the last decade. This...
Another Day, Another PoS Hack. What Makes the Micros Incident Different?
Motivated by money, cybercriminals are always chasing where it goes. That greed has now led them to where transactions are...
‘Cat-Loving’ Mobile Ransomware Operates With Control Panel
Recently the McAfee Labs Mobile Malware Research team found a sample of ransomware for Android with botnet capabilities and a...
Social Media Harassment is a Real Threat. Here’s How to Protect Yourself.
It is an almost undisputable truth that access to a cloak of anonymity and a large, large microphone brings the...
Setting Up HTTPS for Google App Engine Applications
Thursday, we posted advice on creating a custom domain name for an application developed with Google’s App Engine. In this...
Creating a Custom Domain Name with a Google App Engine Application
Google’s App Engine is a Platform as a Service (PaaS) for developers that provides features and frameworks to quickly and...