McAfee Labs

Threat Research Team

LinkedIN Twitter
McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.

Articles by Author

McAfee Labs
Beware the Rapid Proliferation of Cyber-warfare Capabilities
Over 60 countries, a number that is rising, currently have some mechanism to play in the digital warfare and intelligence...
Executive Perspectives
Vulnerable From Below: Attacking Hypervisors Using Firmware And Hardware
Malicious attacks with firmware privileges can compromise an entire system, so it is especially important to apply...
McAfee Labs
McAfee Labs Threats Report Highlights Ransomware, Flash Exploits, Firmware Attacks Surge
The McAfee Labs Threats Report describes a surge in ransomware, new Adobe Flash exploits, and attacks that reprogram hard disk...
McAfee Labs
When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign
Selling stolen data is an easy way for cybercriminals to make money. One typical campaign makes a two-way connection between...
McAfee Labs
Meet ‘Tox’: Ransomware for the Rest of Us
Similar to other threats, ransomware has now appeared in an easy-to-deploy cybercrime kit. The malware is called Tox, and it's...
McAfee Labs
Verizon Report Foreshadows Breaches Originating With IoT Devices
Most examples of security breaches originating with Internet of Things devices have been proofs of concept—at least for now. That...
McAfee Labs
Taking a Close Look at Data-Stealing NionSpy File Infector
NionSpy prefixes its malicious binary onto executable files--unlike other data-stealing Trojans, which store all their functions in a single file.
McAfee Labs
POS Malware Uses Time-Stamp Check to Evade Detection
PoS malware uses timestamp check to make its campaign shot life and evade sandbox by exiting initially to stop running...
McAfee Labs
Apps Sending Plain HTTP Put Personal Data at Risk
At the AVAR Conference in November 2014, McAfee Labs presented how to exploit a cross-site scripting vulnerability...
McAfee Labs
BackOff Malware Uses Encryption to Hide Its Intentions
Often we see malware authors using encryption or obfuscation along with other techniques to modify the static...
McAfee Labs
Beware of Impostor Android Apps Using Fake ID
Recently discovered, an Android vulnerability called Fake ID allows apps to impersonate other apps by copying their...
McAfee Labs
Dofoil Downloader Update Adds XOR-, RC4-Based Encryption
This blog was written by Sanchit Karve. The Dofoil downloader (found in the wild since 2011) occasionally...
145 - 156 of 174

Stay Updated

Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats.

FacebookTwitterInstagramLinkedINYouTubeRSS
Back to top