Featured Blogs
Malware Disguised as Java Update: Careful What You Download!
All too often, cyber attacks are crimes of opportunity. This was exactly the case when late last week, hackers created...
Malware Behaves Oddly in Automated Analysis Environment
While testing malware recently, we got some logs from our automated analysis system showing a few samples that are only...
Malicious Websites – The Web is a Dangerous Place
McAfee’s latest Threats Report shows a growth in malicious websites replacing botnets as the primary infection mechanism. This means that...
Malicious Utility Can Defeat Windows PatchGuard
In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at...
Malicious PowerPoint Documents on the Rise
Authored by Anuradha M McAfee Labs have observed a new phishing campaign that utilizes macro capabilities available in Microsoft PowerPoint....
Malicious Forums Turn Amateur Hackers Into Cybercriminals
Security researchers are aware of forums that offer downloads of malicious software such as keyloggers and remote access tools. Some inexperienced...
Malicious Document Targets Pyeongchang Olympics
McAfee Advanced Threat Research analysts have discovered a campaign targeting organizations involved with the Pyeongchang Olympics. Attached in an email...
Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users
Authored by Oliver Devane and Vallabh Chole September 9, 2022 Update: Since the original publication of this blog on August...
MalBus: Popular South Korean Bus App Series in Google Play Found Dropping Malware
McAfee’s Mobile Research team recently learned of a new malicious Android application masquerading as a plugin for a transportation application...
MalBus Actor Changed Market from Google Play to ONE Store
Authored by: Sang Ryol Ryu and Chanung Pak McAfee Mobile Research team has found another variant of MalBus on an...
Making Online Safety a Priority for Our Tech-Savvy Children
The joy of parenthood! We offer our children the best opportunities to help them become happy, healthy, responsible and educated...
Making Moves to Go Green at McAfee Waterloo
By Gurjeet, Software Engineer, Canada “We should protect Mother Earth. If we don’t take care of her, she won’t take...
Make Your Smart Home a Secure Home Too: Securing Your IoT Smart Home Devices
It’s only a smart lightbulb. Why would anyone want to hack that? Great question. Because it gets to the heart...
Make a Hacker’s Job Harder with Two-step Verification
Using identical passwords is convenient for us as users, but it’s also convenient for any hacker trying to steal personal information—once a hacker has access to one of your accounts, he can use a recycled password to snoop around at will.
Major Websites Twitter, Spotify, Netflix Shut Down by DDoS Attack
We’re no strangers to Armageddon-scenario movies, but today a real disaster hit the internet. Using brute-force tactics that flood key...
Major International Airport’s Security System Found for Sale on Dark Web RDP Shop
The closest many of us get to the dark web is watching hackers surf it in television shows or movies....
Major HTTP Vulnerability in Windows Could Lead to Wormable Exploit
Today, Microsoft released a highly critical vulnerability (CVE-2021-31166) in its web server http.sys. This product is a Windows-only HTTP server...
Macro Malware Targets Macs
Macro malware has been spreading for years. New techniques arise all the time to hide malicious code and thus increase...