View All Publications

Filter Content:

McAfee Labs Quarterly Threat Report June 2017

McAfee Labs researchers examine the most powerful malware evasion techniques past, present, and future; the use of digital steganography in malware; and Fareit, the most famous password stealer.
Topics: McAfee Labs

Protecting Against Evasive Malware

Recommended policies and procedures and how McAfee solutions can combat the most evasive modern threats.
Topics: McAfee Labs

Protecting Against Steganographic Threats

Recommended policies and procedures and how McAfee solutions can protect against steganographic code in malware attacks.
Topics: McAfee Labs

Protecting Against Password Stealers

Recommended policies and procedures and how McAfee solutions can protect systems and networks from password stealers.
Topics: McAfee Labs

McAfee Labs Threats Report: April 2017

McAfee Labs researchers discuss the background and drivers of threat intelligence sharing. We also examine Mirai, which is notable because it detects and infects poorly secured IoT devices, transforming them into bots to attack its targets.
Topics: McAfee Labs

Secure IoT Devices to Protect Against Attacks

McAfee explains how to secure IoT devices and how our products can protect systems and networks from IoT device attacks.
Topics: McAfee Labs

How to Protect Against Ransomware

Learn how Intel Security products leverage a number of technologies that help prevent ransomware.
Topics: McAfee Labs

McAfee Labs Quarterly Threat Report December 2016

Intel Security commissioned a primary research study to gain a deeper understanding of the ways in which enterprises are using security operations centers, how they have changed over time, and what they will look like in the future. The second Key Topic summarizes the year in ransomware. Not only was there a huge jump in the number of ransomware attacks in 2016 but we saw significant technical advancements, too. We detail some of those advancements in this story. Finally, the third Key Topic digs into Trojans that infect legitimate code and hide out, hoping to go unnoticed as long as possible to maximize payouts. We show how attackers are creating long-lasting, fully undetectable malware.
Topics: McAfee Labs

‘Trojanized’ Legitimate Software

This solution brief details how to configure Intel Security products to help prevent Trojan infections and mitigate their propagation.
Topics: McAfee Labs

McAfee Labs 2017 Threats Predictions

Our researchers offer long-lens predictions about cloud and internet of things (IoT) threats, laws, and vendor responses. They also make specific predictions about threats activity in 2017, including ransomware, vulnerabilities of all kinds, and the use of threat intelligence to improve defenses.
Topics: McAfee Labs