Featured Blogs
If we can’t trust technology we won’t (and shouldn’t) use it
Walking this year’s Mobile World Congress I am no longer thrown by the devices, gadgets and flashy booths, but completely...
Spora Ransomware Infects ‘Offline’—Without Talking to Control Server
Spora is a ransomware family that encrypts victims’ files and demands money to decrypt the files. It has infected many...
Technology companies should ‘at least do no harm’
Mobile World Congress (MWC) provides yet another opportunity for technology giants to flex their muscles and whip the industry into...
Macro Malware Targets Macs
Macro malware has been spreading for years. New techniques arise all the time to hide malicious code and thus increase...
The Answer to Big Cybersecurity Challenges: Think Small
This blog was written by Chris Young, McAfee’s former CEO. I just left the keynote stage at RSA 2017, where...
Analyzing KillDisk Ransomware, Part 2: Variants and Screen Unlocking
This blog post was written by Sudhanshu Dubey. At McAfee Labs we recently analyzed the ransomware KillDisk. In part 1 of...
McAfee Launches ‘Threat Landscape Dashboard’
Every week, we read in the news of another breach or targeted campaign, as more patches are released to protect...
Welcome Mike Berry, McAfee’s new CFO
This blog was written by Chris Young, McAfee’s former CEO. I’m pleased to announce Mike Berry is joining McAfee as...
Analyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service
The network time protocol synchronizes time across various devices on a network. The network time protocol daemon (NTPD) is an...
Spotlight on Shamoon
Our analysis this month has pointed to Shamoon emerging in the Middle East. We have recently seen a number of...