Featured Blogs
Analyzing the Target Point-of-Sale Malware
January 21, 2014: As more information comes to light, surrounding these events, we continue to identify and analyze additional components...
2014 Threats Predictions: Network and Host Attacks Will Again Target Apps, Java
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions....
2014 Threats Predictions: Cybercrime and Hacktivism Will Continue to Grow
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions....
2014 Threats Predictions: Software Defined Networking And More
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions....
Variant of Pony Botnet Pickpockets Bitcoin Users
Last month the Pony Botnet became a household name when it was revealed that it had stolen more than two...
2014 Threats Predictions: Cloud Attacks Could Lead to Data Loss
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In...
11 Steps to Improve your Personal Digital Security
Everyone with an account on a smart phone, tablet, laptop or PC also knows about phishing, scamming, password and identity...
Suspicious Apps on Google Play Leak Google Account IDs
The Google account ID (or account name), which in most cases is a Gmail address, is one of the key...
Analyzing the Recent Windows Zero-Day Escalation of Privilege Exploit
Recently we caught a malicious sample that exploits a PDF vulnerability–CVE-2013-3346, we believe–and executes after a use-after-free condition occurs. During...
More Japanese Chat Apps on Google Play Steal Phone Numbers
In two recent blogs, McAfee Labs described Japanese and Korean Android apps on Google Play that steal a mobile device’s...