Featured Blogs
POS Malware Uses Time-Stamp Check to Evade Detection
This blog post was written by Kumaraguru Velmurugan. Point of sale (POS) attacks appear to have gained in popularity during...
Protect Your Web Applications
Reverse proxies are critical to shield Web apps from external attacks. Many organizations today are concerned about how to safely...
Trend Countdown: My Top 5 Digital Marketing Trends to Watch
This blog post was written by Penny Baldwin. Marketers, take note: A killer digital marketing campaign is no longer about...
Teslacrypt Joins Ransomware Field
A newly crafted ransomware, Teslacrypt, has arrived in the malware genre that encrypts user files using AES encryption and demands...
Attacks On Indian Organizations Continue – More Exploits Focused On Events
In November last year, McAfee Labs researchers reported about Operation Mangal, an ongoing targeted attack campaign against several Indian domestic...
Techniques, Lures, and Tactics to Counter Social Engineering Attacks
If you are unsure of whether a destination link is safe, tools like TrustedSource are a good place to start....
Amazon Gift Card Malware Spreading via SMS
McAfee Labs recently published its Hacking the Human OS report, which details a number of ways in which cybercriminals rely...
Social Engineering in the Internet of Things (IoT)
Successful social engineering attacks through IoT systems could lead to a perception of being surrounded by hostile devices, and greatly...
Steamstealer Attacks Victims via Chat
During the last few months, McAfee Labs has seen an increase in Steamstealer samples. The following chart shows the recent...
We Tried the NIST Framework and It Works
By Kent Landfield, Director of Standards and Technology Policy, McAfee, and Malcolm Harkins, Chief Security and Privacy Officer at McAfee...