Quantcast
Channel: McAfee Labs | McAfee Blogs
Browsing all 745 articles
Browse latest View live

‘McAfee Labs Threats Report’ Offers Primer on Security Data Science,...

Analytics, big data, automation, and machine learning are all terms we use when talking about the future of cybersecurity. As the volume of security data increases, data science will become an...

View Article


Image may be NSFW.
Clik here to view.

How Can We Stop ‘ROP’ Cyberattacks?

IBM recently announced a software-oriented solution to help eradicate attacks by return-oriented programming (ROP) malware. ROP malware is a significant and growing problem in the industry. Crafty...

View Article


Image may be NSFW.
Clik here to view.

Macro Malware Employs Advanced Sandbox-Evasion Techniques

During the past couple of weeks, McAfee Labs has observed a new variant of macro malware. With this variant when we click on a doc file, we see the message “This document is protected against...

View Article

Image may be NSFW.
Clik here to view.

Sharing Cybersecurity Threat Intelligence Is the Only Way We Win

Cybersecurity is a team sport. The bad guys share information, expertise, and code as they help one another. The good guys must do the same to keep pace. Sharing threat intelligence is a key aspect in...

View Article

CTO Q&A: Campaign Hacks, Yahoo! and Clinton-Trump

Over the last several days, we’ve seen headlines on potential cyber-attacks on state voter registries, cybersecurity front and center in the Clinton-Trump presidential debate, and new revelations into...

View Article


Image may be NSFW.
Clik here to view.

New Security Reality for Internet of Things

  Recent distributed denial of service (DDoS) attacks are forcing a shift in how we think about the Internet of Things (IoT). The dangers are expanding as attackers are taking advantage of billions of...

View Article

Image may be NSFW.
Clik here to view.

Everyone Loves Selfies, Including Malware!

I was talking with some of my coworkers the other day about why I wanted to jump to the larger iPhone 7 Plus.  For me it came down to the camera.  I travel a lot for work and even though photography is...

View Article

Image may be NSFW.
Clik here to view.

Android Banking Trojan Asks for Selfie With Your ID

In the first half of 2016 we noticed that Android banking Trojans had started to improve their phishing overlays on legitimate financial apps to ask for more information. Victims were requested to...

View Article


Image may be NSFW.
Clik here to view.

Ransomware Variant XTBL Another Example of Popular Malware

We have seen a huge increase in ransomware during the past couple of years. At McAfee Labs we have recently received a sample of the low-profile XTBL, a ransomware family that encrypts files and...

View Article


Image may be NSFW.
Clik here to view.

No More Ransom Adds Law Enforcement Partners From 13 Countries

  Intel Security and Kaspersky Labs today announced that 13 law enforcement agencies have joined No More Ransom, a partnership between cybersecurity industry and law enforcement organizations to...

View Article

Image may be NSFW.
Clik here to view.

How to: Testing Android Application Security, Part 4

One of the best ways to develop secure Android applications is to engage in penetration (pen) testing, in effect trying to break into your application just as an attacker might do. This is the fourth...

View Article

Image may be NSFW.
Clik here to view.

Password-Protected Attachment Serves Ransomware

Attacks by macro malware carrying ransomware are growing, as we have recently reported. Since early March we have seen macro malware using high-obfuscation algorithms to hide itself from static and...

View Article

Image may be NSFW.
Clik here to view.

Unfolding the Mystery of Cerber Ransomware’s Random File Extension

In an earlier blog, we discussed the evolution of the popular Cerber ransomware from Version 1 to 2. Recently we came across two newer versions of Cerber (we’ll call them Versions 3 and X). Cerber 3...

View Article


Image may be NSFW.
Clik here to view.

How to Secure the Future of the Internet of Things

The world of security for the Internet of Things just became more complex. IoT devices are no longer a potential threat to their owners; now they pose a significant threat to everything connected to...

View Article

How ‘Weaponized’ Medical Data Could Be as Damaging as Clinton’s Emails or...

The 2016 presidential election in the United States will be remembered for a great many things. Never before in US history has the disclosure or nondisclosure of personal information figured so...

View Article


A ‘Second Economy’ Prognosis for Health Care Cybersecurity

Intel Security CTO Steve Grobman has pointed out that gaining the upper hand in cybersecurity requires that we extend our thinking beyond the physical economy of money, assets, goods, and services to a...

View Article

Image may be NSFW.
Clik here to view.

The Latest IoT Device I Do Not Want Hacked

What if someone hacked this remotely controlled semiautonomous tractor? I am a cybersecurity guy and a huge fan of technology. One of the challenges we face in the security industry is the growth of...

View Article


Image may be NSFW.
Clik here to view.

How Valuable is Your Healthcare Data?

Health care is a hot topic in security right now. A quick search for “hospital ransomware” returns a laundry list of news reports on hospitals as targets of cyberattacks. However, it is not just...

View Article

Image may be NSFW.
Clik here to view.

Microsoft’s June Patch Kills Potential CFG Bypass

After applying Microsoft’s June patch, we noticed some interesting changes that prevent a security bypass of Windows’ Control Flow Guard (CFG). The changes are in the Shader JIT compiler of the Windows...

View Article

Image may be NSFW.
Clik here to view.

JavaScript-PHP Joint Exercise Delivers Nemucod Ransomware

The ransomware Nemucod has been very prevalent in the last few months. Nemucod’s habit of frequently changing its delivery mechanism and infection vector to evade detection makes this threat very...

View Article
Browsing all 745 articles
Browse latest View live