Quantcast
Channel: McAfee Labs | McAfee Blogs
Browsing all 745 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

“Trojanization” of Legit Apps on the Rise

McAfee today released its McAfee Labs Threats Report: December 2016. The report’s third key topic illustrates how attackers are creating difficult-to-detect malware by infecting legitimate code with...

View Article


Image may be NSFW.
Clik here to view.

‘SSL Death Alert’ (CVE-2016-8610) Can Cause Denial of Service to OpenSSL Servers

Recently we noticed a security patch has been published for the OpenSSL vulnerability called SSL Death Alert. As with other serious security vulnerabilities, this one grabbed our attention because the...

View Article


Image may be NSFW.
Clik here to view.

‘Popcorn Time’ Ransomware Sure to Cause Indigestion

In early December the new ransomware “Popcorn Time” was discovered. It gives the victim the option of paying the ransom or infecting two other individuals and getting them to pay. “Popcorn Time” is a...

View Article

Image may be NSFW.
Clik here to view.

An Overview of Malware Self-Defense and Protection

Many malware authors spend a great deal of time and effort to develop complex code. Their success depends on a threat’s remaining undetected and avoiding sandbox analysis, antivirus efforts, or malware...

View Article

Image may be NSFW.
Clik here to view.

Did You Forget to Patch Your IP Camera?

IP cameras are usually “purchase, install, and don’t touch” devices. But in the current climate of cyberattacks, they now require regular updates and patches. Otherwise your security tool may be...

View Article


Image may be NSFW.
Clik here to view.

Floki Bot a Sensation With International Cybercriminals

Floki Bot, new financial malware, is popular with English-, Portuguese-, and Russian-speaking underground criminal markets, winning over cybercriminals with new features and functionality. It is...

View Article

Image may be NSFW.
Clik here to view.

Next Targets for Cybercriminals: the Short Term (Part 1)

  Knowing what cybercriminals are targeting today is easy. Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a china shop. The tougher challenge is figuring...

View Article

Image may be NSFW.
Clik here to view.

Next Targets for Cybercriminals: the Long Term (Part 2)

In the previous post in this series, I outlined how cybercriminals will use the holiday season to victimize unwary consumers and target businesses. They will also dive deeper into leveraging devices...

View Article


Image may be NSFW.
Clik here to view.

Digging Into a Windows Kernel Privilege Escalation Vulnerability: CVE-2016-7255

This blog was written by Stanley Zhu. The Windows kernel privilege escalation vulnerability CVE-2016-7255 has received a lot of media attention. On November’s Patch Tuesday, Microsoft released a fix...

View Article


Image may be NSFW.
Clik here to view.

Top Tips for Securing Home Cameras

Installing a home surveillance camera system can add great benefits but also may introduce new risks to privacy and network security. The goal is to increase your security and peace of mind, while...

View Article

Image may be NSFW.
Clik here to view.

Turkish Instagram Password Stealers Found on Google Play

McAfee’s mobile malware research team has found several Instagram password stealers on the Google Play store. (Google has since removed the apps.) These malware are distributed as utilities and tools...

View Article

Image may be NSFW.
Clik here to view.

Trojanized Photo App on Google Play Signs Up Users for Premium Services

Mobile apps usually have names that give some indication of their function. In one recent case, however, we found a misnamed app that turned out to be malicious. Every Android app has an ID value,...

View Article

Image may be NSFW.
Clik here to view.

Stopping Malware With a Fake Virtual Machine

As we explained in a previous post, some advanced malware can detect a virtual environment such as a sandbox to avoid detection and analysis. Some threats can also detect monitoring tools used for...

View Article


Image may be NSFW.
Clik here to view.

Analyzing KillDisk Ransomware, Part 1: Whitelisting

At McAfee Labs we recently analyzed the ransomware KillDisk. We will share our analysis in two parts: the first, this article, contains general information about the malware and its whitelisting...

View Article

Image may be NSFW.
Clik here to view.

With Release of Windows 10, Questions About BitLocker Arise Again

This post was written by Ted Pan. For those of you who were around during the original release of Microsoft’s BitLocker, previously known as Secure Startup, you will remember that it was meant to...

View Article


Image may be NSFW.
Clik here to view.

Spotlight on Shamoon

Our analysis this month has pointed to Shamoon emerging in the Middle East. We have recently seen a number of similarities that we had highlighted in our earlier blogs (on mcafee.com). The campaign...

View Article

Image may be NSFW.
Clik here to view.

Analyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service

The network time protocol synchronizes time across various devices on a network. The network time protocol daemon (NTPD) is an open-source implementation of this protocol. In the last couple of months,...

View Article


Image may be NSFW.
Clik here to view.

McAfee Launches ‘Threat Landscape Dashboard’

Every week, we read in the news of another breach or targeted campaign, as more patches are released to protect against the next strain of sophisticated malware. For the administrators responsible for...

View Article

Image may be NSFW.
Clik here to view.

Analyzing KillDisk Ransomware, Part 2: Variants and Screen Unlocking

At McAfee Labs we recently analyzed the ransomware KillDisk. In part 1 of this analysis, we discussed the basics of the malware and its whitelisting to protect itself. In this part, we will provide...

View Article

Image may be NSFW.
Clik here to view.

The Cyber Threat Alliance Steps Up to Boost Protection

This blog post was written by Vincent Weafer. With each new cyber threat report, we learn about the increasing volume of new, complex threats appearing across a myriad of server systems, networking...

View Article
Browsing all 745 articles
Browse latest View live