Search

Visualizza tutte le pubblicazioni



Hide English Publications

McAfee Labs Rapporto sulle minacce: Novembre 2015
McAfee Labs’ quarterly analysis of key threat topics and trends.
Argomenti: McAfee Labs

Protezione contro il malware senza file
This solution brief discusses the three types of fileless malware that evade detection by reducing the storage of binaries on disk and operate on the memory of the compromised host.
Argomenti: McAfee Labs

Protezione contro il malware delle macro
Get an in-depth look at macro malware and understand its resurgence in appearance since the 1990s.
Argomenti: McAfee Labs

McAfee Labs Rapporto Previsioni sulle minacce nel 2016
This report includes two distinct views of the future: First, we look forward five years and predict how the cyber threat landscape will change and the security industry’s likely response. Then, we look tactically at 2016 and make specific predictions about expected threat activity.
Argomenti: McAfee Labs

L'economia sommersa dei dati
The marketplace for stolen digital information
Argomenti: McAfee Labs

Report McAfee Labs sulle minacce: Agosto 2015
McAfee Labs’ quarterly analysis of key threat topics and trends.
Argomenti: McAfee Labs

Blocco dell'esfiltrazione dei dati
Data exfiltration tactics and techniques used by cyber thieves and how to combat data theft.
Argomenti: McAfee Labs

Protezione contro il malware delle GPU
Policies, procedures, and products that can protect against GPU attacks.
Argomenti: McAfee Labs

Report McAfee Labs sulle minacce: Maggio 2015
McAfee Labs’ quarterly analysis of key threat topics and trends.
Argomenti: McAfee Labs

Sconfiggi il ransomware: assicurati che i tuoi dati non siano presi in ostaggio
Learn how to stop ransomware before it strikes.
Argomenti: McAfee Labs

Protezione contro gli exploit di Adobe Flash
A practical approach to detect and protect against Adobe Flash exploits.
Argomenti: McAfee Labs

Prova a prendermi: gli scherzi giocati da un botnet polimorfico
This in-depth report discusses the polymorphic worm W/32Worm-AAEH, the control infrastructure behind it, and what it took to take it down.
Argomenti: McAfee Labs

Report McAfee Labs sulle minacce: Febbraio 2015
McAfee Labs’ quarterly analysis of key threat topics and trends.
Argomenti: McAfee Labs

Proteggersi dalle vulnerabilità SSL delle app mobili
Many mobile apps are vulnerable to man-in-the-middle attacks. Learn how to protect against them.
Argomenti: McAfee Labs

Defeating the Angler Exploit Kit (English)
The Angler exploit kit has become one of the most popular and powerful attack kits. Learn how to protect against it.
Argomenti: McAfee Labs

Sconfiggere il kit di exploit Angler
The Angler exploit kit has become one of the most popular and powerful attack kits. Learn how to protect against it.
Argomenti: McAfee Labs

Protecting Against Potentially Unwanted Programs (English)
PUPs are applications that have legitimate uses but have functions and behaviors that can be exploited against the user without the user’s consent. Learn about PUPs and how to contain them.
Argomenti: McAfee Labs

Proteggersi dai programmi potenzialmente indesiderati
PUPs are applications that have legitimate uses but have functions and behaviors that can be exploited against the user without the user’s consent. Learn about PUPs and how to contain them.
Argomenti: McAfee Labs

Come si sfrutta la debolezza del sistema operativo umano — Executive Summary
This executive summary provides an overview of social engineering as an attack vector. It lists the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.
Argomenti: McAfee Labs

Hacking the Human Operating System (English)
This in-depth report examines social engineering as an attack vector. It details the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.
Argomenti: McAfee Labs