McAfee Labs

Read McAfee Labs blogs for the latest threat research, threat intelligence, and thought leadership from the Threat Research team.

Pirate Versions of Popular Apps Infiltrate Google Play via Virtualization
The McAfee Mobile Research team recently found pirated applications of popular apps distributed on the Google Play store.
Expiro Malware Is Back and Even Harder to Remove
The Expiro virus is has been around for more than a decade, and the authors continue to update it with...
Configuring McAfee ENS and VSE to Prevent Macroless Code Execution in Office Apps
Microsoft Office macros are a popular method of distributing malware. Users can defend themselves against macro attacks by disabling macros.
Code Execution Technique Takes Advantage of Dynamic Data Exchange
Email phishing campaigns are a popular social engineering technique among hackers. The idea is simple.
Analyzing Microsoft Office Zero-Day Exploit CVE-2017-11826
Microsoft released an update for an Office zero-day attack. We examined an in-the-wild sample, and share our findings to help others.
‘BadRabbit’ Ransomware Burrows Into Russia, Ukraine
This post was researched and written by Christiaan Beek, Tim Hux, David Marcus, Charles McFarland, Douglas McKee,...
KRACKs: Five Observations on WPA Authentication Vulnerability
KRACKs are in the news. McAfee has already discussed these key reinstallation attacks that affect Wi-Fi setups...
ROCA: Which Key-Pair Attacks Are Credible?
This blog was co-written by Brook Schoenfield. In the past two weeks, we have seen two big...
KRACKs Against Wi-Fi Serious But Not End of the World
On October 12, researcher Mathy Vanhoef announced a set of Wi-Fi attacks that he named KRACKs, for key reinstallation attacks.
Tips for Effective Threat Hunting
McAfee surveyed more than 700 IT and security professionals to better understand how threat hunting is used in organizations.
Taiwan Bank Heist and the Role of Pseudo Ransomware
Widespread reports claim the Far Eastern International Bank in Taiwan has become a victim of hacking. The...
Staying Anonymous on the Blockchain: Concerns and Techniques
Because a blockchain ledger is public, maintaining anonymity is hard, especially in the case of Bitcoin.
301 - 312 of 689
Back to top