Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress

More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss...

McAfee Labs

Targeted Ransomware No Longer a Future Threat

This post was written by Christiaan Beek and Andrew Furtak. In 2015, McAfee investigated a ransomware campaign that targeted the...

McAfee Labs

Malicious Forums Turn Amateur Hackers Into Cybercriminals

Security researchers are aware of forums that offer downloads of malicious software such as keyloggers and remote access tools. Some inexperienced...

McAfee Labs

Nivdort: Data-Stealing Trojan Arrives via Spam

During the past couple of weeks, McAfee Labs has observed a huge increase in spam related to Nivdort, a malicious file...

McAfee Labs

Does Anyone Really Care About Mobile Security?

I’ve attended Mobile World Congress a number of times and it is fair to say the concept of the show...

McAfee Labs

Clever Phishing Attacks Target Google, Yahoo, DHL Customers

Last week McAfee Labs received a phishing page that efficiently uses the CSS format of the Gmail login page and...

McAfee Labs

Ransomware Targets Healthcare Sector

When we develop threats predictions at McAfee, I personally like to conduct some proper research and base my statements on...

McAfee Labs

HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit

McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the Angler...

Executive Perspectives

Landmark Cybersecurity Proposals from White House

This blog was written by Chris Young, McAfee’s former CEO. It’s great to see the White House leaning forward and...

McAfee Labs

A Case of Mistaken Identity? The Role of BlackEnergy in Ukrainian Power Grid Disruption

Recent reports of electricity outages across the Ukraine has led to significant speculation regarding the specific malware that was used...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top