Featured Blogs
A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress
More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss...
Targeted Ransomware No Longer a Future Threat
This post was written by Christiaan Beek and Andrew Furtak. In 2015, McAfee investigated a ransomware campaign that targeted the...
Malicious Forums Turn Amateur Hackers Into Cybercriminals
Security researchers are aware of forums that offer downloads of malicious software such as keyloggers and remote access tools. Some inexperienced...
Nivdort: Data-Stealing Trojan Arrives via Spam
During the past couple of weeks, McAfee Labs has observed a huge increase in spam related to Nivdort, a malicious file...
Does Anyone Really Care About Mobile Security?
I’ve attended Mobile World Congress a number of times and it is fair to say the concept of the show...
Clever Phishing Attacks Target Google, Yahoo, DHL Customers
Last week McAfee Labs received a phishing page that efficiently uses the CSS format of the Gmail login page and...
Ransomware Targets Healthcare Sector
When we develop threats predictions at McAfee, I personally like to conduct some proper research and base my statements on...
HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit
McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the Angler...
Landmark Cybersecurity Proposals from White House
This blog was written by Chris Young, McAfee’s former CEO. It’s great to see the White House leaning forward and...
A Case of Mistaken Identity? The Role of BlackEnergy in Ukrainian Power Grid Disruption
Recent reports of electricity outages across the Ukraine has led to significant speculation regarding the specific malware that was used...