Featured Blogs
Turkish ‘Delete Virus’ Targets Facebook Users
Facebook continues to be a favorite target for attackers to spread fake wall-post messages or fake scams. Most of the...
Phishing Threat Uses UTF-8 BOM in ZIP Signature to Evade Detection
This blog was written by Sanchit Karve. Last week, we noticed thousands of malware files in the wild that employ...
Multiple Java Exploits Hide in a Jar (File)
Exploits of the Java Runtime Environment (JRE) have been extensively used in drive-by-download toolkits such as Blackhole and Red Kit....
Online Safety for Kids – The App Your Kids are Using Now: Snapchat
The #1 question asked by parents when I present for McAfee’s Online Safety for Kids program, is “Where do I...
VSkimmer Botnet Targets Credit Card Payment Terminals
April 2 This blog has been updated with McAfee’s NSP detection. See end of blog. While monitoring a Russian underground...
How to Protect Yourself from Tax Scams
Tax season is now upon us, and more than ever, we are opting for the convenience of filing taxes online...
Tax Season Email Scam Aims to Steal from Uncle Sam
Every year around tax season, we see a huge spike in tax-related social engineering attacks. Social engineering is a type...
Travnet Trojan Could Be Part of APT Campaign
This blog post was written by Vikas Taneja. Attackers use all kinds of attack vectors to steal sensitive information from...
An Overview of Messaging Botnets
In the quarterly McAfee Threats Reports we offer our readers some charts on the prevalence of messaging botnets. For the...
Android Malware Goes Bollywood
We already know that mobile malware is growing at a fantastic rate, but we now see a new trend that...