Featured Blogs
Hidden Data Economy Report Exposes Price Points for Stolen Data
McAfee today released The Hidden Data Economy report, which provides examples of how different types of stolen data is being...
We’ve Been Hacked! Okay, I’ll Deal With It Next Week
That was the message I got from a CEO when we presented evidence that their organization had been compromised and...
Japanese Banking Trojan Shifu Combines Malware Tools
In recent weeks, McAfee Labs has analyzed a recently discovered banking Trojan that combines elements from multiple malware tools. Shifu...
How Is Your Data Getting Out?
It’s 11:00 p.m. Do you know where your data is? Most reports on data theft events concentrate on how the...
Your “Check Security” Light is On
Please restart your car in safe mode Your car may not get a “Check Security” light in the future, but...
Best practices for preventing Dridex infections
Mitigating the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of...
AshleyMadison Hack Demonstrates Power of Scam Artists
This blog post was written by Armando Rodriguez. Last month, cybersecurity journalist Brian Krebs broke the news that adult site...
Vulnerable From Below: Attacking Hypervisors Using Firmware And Hardware
Malicious attacks with firmware privileges can compromise an entire system, so it is especially important to apply measures to reduce...
What Morpho Means: Why Hackers Target Intellectual Property And Business
A quiet, professional cyberespionage group steals what every company wants to keep secret: valuable information that drives business. Welcome to...
Ease of Buying Ransomware Fuels Affiliate Program
For several weeks after we released the McAfee Labs Threats Report, May 2015, in which we discussed the topic of...