Featured Blogs
With Release of Windows 10, Questions About BitLocker Arise Again
This post was written by Ted Pan. For those of you who were around during the original release of Microsoft’s...
Analyzing KillDisk Ransomware, Part 1: Whitelisting
This blog post was written by Sudhanshu Dubey. At McAfee Labs we recently analyzed the ransomware KillDisk. We will share...
Stopping Malware With a Fake Virtual Machine
As we explained in a previous post, some advanced malware can detect a virtual environment such as a sandbox to...
Trojanized Photo App on Google Play Signs Up Users for Premium Services
Mobile apps usually have names that give some indication of their function. In one recent case, however, we found a...
Turkish Instagram Password Stealers Found on Google Play
McAfee’s mobile malware research team has found several Instagram password stealers on the Google Play store. (Google has since removed...
Top Tips for Securing Home Cameras
Installing a home surveillance camera system can add great benefits but also may introduce new risks to privacy and network...
2017 – New Year, Better Security
Avoid junk food, exercise more, save some money. Every year around this time you can find gazillions (technical term) of...
Digging Into a Windows Kernel Privilege Escalation Vulnerability: CVE-2016-7255
This blog was written by Stanley Zhu. The Windows kernel privilege escalation vulnerability CVE-2016-7255 has received a lot of media...
Next Targets for Cybercriminals: the Long Term (Part 2)
In the previous post in this series, I outlined how cybercriminals will use the holiday season to victimize unwary consumers...
Next Targets for Cybercriminals: the Short Term (Part 1)
Knowing what cybercriminals are targeting today is easy. Their attacks are loud, impactful, and have the elegance of a...