Search

Afficher toutes les publications



Hide English Publications

Rapport de McAfee Labs sur le paysage des menaces: Novembre 2015
McAfee Labs’ quarterly analysis of key threat topics and trends.
Sujets : McAfee Labs

Protection contre les logiciels malveillants sans fichier
This solution brief discusses the three types of fileless malware that evade detection by reducing the storage of binaries on disk and operate on the memory of the compromised host.
Sujets : McAfee Labs

Mesures de protection contre les logiciels malveillants diffusés par macro
Get an in-depth look at macro malware and understand its resurgence in appearance since the 1990s.
Sujets : McAfee Labs

McAfee Labs Rapport Prévisions 2016 en matière de menaces
This report includes two distinct views of the future: First, we look forward five years and predict how the cyber threat landscape will change and the security industry’s likely response. Then, we look tactically at 2016 and make specific predictions about expected threat activity.
Sujets : McAfee Labs

Les données au cœur d'une économie souterraine
The marketplace for stolen digital information
Sujets : McAfee Labs

Rapport de McAfee Labs sur le paysage des menaces: Août 2015
McAfee Labs’ quarterly analysis of key threat topics and trends.
Sujets : McAfee Labs

Halte à l'exfiltration de données
Data exfiltration tactics and techniques used by cyber thieves and how to combat data theft.
Sujets : McAfee Labs

Protection contre les logiciels malveillants ciblant le GPU
Policies, procedures, and products that can protect against GPU attacks.
Sujets : McAfee Labs

Rapport de McAfee Labs sur le paysage des menaces: Mai 2015
McAfee Labs’ quarterly analysis of key threat topics and trends.
Sujets : McAfee Labs

Échec et mat aux logiciels de demande de rançon : ne laissez pas vos données se faire prendre en otage
Learn how to stop ransomware before it strikes.
Sujets : McAfee Labs

Protection contre les exploits Adobe Flash
A practical approach to detect and protect against Adobe Flash exploits.
Sujets : McAfee Labs

Arrête-moi si tu peux: Les facéties d'un réseau de robots polymorphe
This in-depth report discusses the polymorphic worm W/32Worm-AAEH, the control infrastructure behind it, and what it took to take it down.
Sujets : McAfee Labs

Rapport de McAfee Labs sur le paysage des menaces: Février 2015
McAfee Labs’ quarterly analysis of key threat topics and trends.
Sujets : McAfee Labs

Protection contre les vulnérabilités SSL des applications mobiles
Many mobile apps are vulnerable to man-in-the-middle attacks. Learn how to protect against them.
Sujets : McAfee Labs

Mettre en échec le kit d'exploits Angler
The Angler exploit kit has become one of the most popular and powerful attack kits. Learn how to protect against it.
Sujets : McAfee Labs

Protection contre les programmes potentiellement indésirables (PUP)
PUPs are applications that have legitimate uses but have functions and behaviors that can be exploited against the user without the user’s consent. Learn about PUPs and how to contain them.
Sujets : McAfee Labs

Hacking the Human Operating System (English)
This in-depth report examines social engineering as an attack vector. It details the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.
Sujets : McAfee Labs

L'être humain, nouvelle cible des pirates — Résumé
This executive summary provides an overview of social engineering as an attack vector. It lists the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.
Sujets : McAfee Labs

BERserk : la contreattaque
Trust is no longer present when the privacy, integrity, and authenticity of our information is called into question. Learn how you can protect your company against attacks that attempt to exploit the BERserk vulnerability.
Sujets : McAfee Labs

Abus de confiance
Attackers prey upon the institution of trust in many ways, with exploiting unsuspecting victims the primary pursuit. Learn how McAfee security technology can help protect against attacks seeking to abuse the trust your company has in its day-to-day operations.
Sujets : McAfee Labs