Featured Blogs
Android App Contains Windows Worm
When developers are unaware of security they open the door to threats against their customers and users. We are not...
Java Back Door Acts as Bot
The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found...
Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code
Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware...
Japanese One-Click Scammers Abuse Mobile Traffic Exchange Service
McAfee has been monitoring and reporting extensively on one-click-fraud malware for Android in Japan this year. These attacks, primarily on...
Introducing App Reputation for Android Apps
McAfee has always been in the forefront of finding new ways to secure our customers against threats and risks posed...
Android Master-Key Malware Already Blocked by McAfee Mobile Security
The Android Master Key vulnerability, which was first reported by BlueBox Security, has been big news this month. McAfee explained...
Malware Manipulates Procedure Prologue and Epilogue to Evade Security
Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers,...
Adult Voice-Service Apps on Google Play Japan Charge Users Without Notice
McAfee has reported on increasing fraudulent Android applications on Google Play in Japan this year, including one-click fraud applications and...
New Zero-Day Attack Copies Earlier Flash Exploitation
Late on July 10, Microsoft released a blog post disclosing that they were aware of a zero-day attack in the...
Styx Exploit Kit Takes Advantage of Vulnerabilities
Web-based malware has increased over the last few years due to an abrupt spike in new exploit kits. These kits...