Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

Teslacrypt Joins Ransomware Field

A newly crafted ransomware, Teslacrypt, has arrived in the malware genre that encrypts user files using AES encryption and demands...

McAfee Labs

Attacks On Indian Organizations Continue – More Exploits Focused On Events

In November last year, McAfee Labs researchers reported about Operation Mangal, an ongoing targeted attack campaign against several Indian domestic...

Executive Perspectives

Techniques, Lures, and Tactics to Counter Social Engineering Attacks

If you are unsure of whether a destination link is safe, tools like TrustedSource are a good place to start....

McAfee Labs

Amazon Gift Card Malware Spreading via SMS

McAfee Labs recently published its Hacking the Human OS report, which details a number of ways in which cybercriminals rely...

Executive Perspectives

Social Engineering in the Internet of Things (IoT)

Successful social engineering attacks through IoT systems could lead to a perception of being surrounded by hostile devices, and greatly...

McAfee Labs

Steamstealer Attacks Victims via Chat

During the last few months, McAfee Labs has seen an increase in Steamstealer samples. The following chart shows the recent...

Executive Perspectives

We Tried the NIST Framework and It Works

By Kent Landfield, Director of Standards and Technology Policy, McAfee, and Malcolm Harkins, Chief Security and Privacy Officer at McAfee...

McAfee Labs

The Rise of Backdoor-FCKQ (CTB-Locker)

By Raj Samani (@Raj_Samani) and Christiaan Beek (@ChristiaanBeek) In the McAfee Labs Threats Report published in November 2014, Senior Vice...

McAfee Labs

Apps Sending Plain HTTP Put Personal Data at Risk

At the AVAR Conference in November 2014, McAfee Labs presented how to exploit a cross-site scripting vulnerability of the Costco...

Executive Perspectives

What a Breach can Teach: It Starts with a Strategy

This blog was written by Brett Kelsey. This is part II in a series on proactive defense using a proven...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top