Life at McAfee

Supporting Our Military Veterans at McAfee

By Dawson McPherson, Talent & Communications Coordinator Over the past week, McAfee employees around the world paused to recognize and honor all the brave military men and women who have served their countries. From a veterans appreciation ceremony at our Plano, Texas office, to a display of red poppies in observation of Remembrance Day at …

Consumer

World Password Day RT to Win Sweepstakes

Terms and Conditions How to Win: Happy World #PasswordDay! Once completed share your results on Twitter and tag @McAfee_Home, #PasswordDay, #RT2Win, and #Sweepstakes for a chance at a $50 Amazon Gift card. Two total winners will be selected: the first drawing will happen on May 11, 2017, and the second drawing will happen on May …

McAfee Labs

You Can Outsource the Work, but You Cannot Outsource the Risk

Threats, Regulations, and Vendor Responses to Risks in the Cloud As more companies get comfortable with cloud services, trust and usage will go up, and that will inevitably attract the attention of cybercriminals. Although an increasing array of sensitive and confidential data is moving to cloud storage and processing, we expect that most businesses will …

McAfee Labs

Brazilian Banking Malware Hides in SQL Database

Spam is a plague that has given headaches to system administrators and users for years. A lot of spam tries to sell “performance enhancement” medicine or lure us to suspicious websites. But one of the main uses of spam, which appears to be making a comeback, is the distribution of malware through email attachments. This …

McAfee Labs

Chinese Trojan Hooks Macs, iPhones

“Distrust and caution are the parents of security”–Benjamin Franklin A recent threat targeting Chinese users of Mac OS X and iPhone came to light yesterday. The malware, called WireLurker, is distributed by the Chinese third-party app store Maiyadi. Since the threat’s discovery, more than 400 applications containing the Trojan were identified at the store. Two …

McAfee Labs

Examining Your Very Own Sefnit Trojan

Most malware is created for economic purposes. To name just a few of our reports and blogs on this topic, we have written about Cybercrime Exposed, stolen data, and the Target point-of-sale malware. But sometimes it’s not clear to our customers how much time and skill malware authors invest in their tools. A recent case …