Visualizza tutte le pubblicazioni



Hide English Publications

Catch Me If You Can: Antics of a Polymorphic Botnet (English)
This in-depth report discusses the polymorphic worm W/32Worm-AAEH, the control infrastructure behind it, and what it took to take it down.
Argomenti: McAfee Labs

When Evolution Turns Dark (English)
Learn how to protect against polymorphic worms like W/32Worm-AAEH.
Argomenti: McAfee Labs

Report McAfee Labs sulle minacce: Febbraio 2015
McAfee Labs’ quarterly analysis of key threat topics and trends.
Argomenti: McAfee Labs

Proteggersi dalle vulnerabilità SSL delle app mobili
Many mobile apps are vulnerable to man-in-the-middle attacks. Learn how to protect against them.
Argomenti: McAfee Labs

Defeating the Angler Exploit Kit (English)
The Angler exploit kit has become one of the most popular and powerful attack kits. Learn how to protect against it.
Argomenti: McAfee Labs

Sconfiggere il kit di exploit Angler
The Angler exploit kit has become one of the most popular and powerful attack kits. Learn how to protect against it.
Argomenti: McAfee Labs

Protecting Against Potentially Unwanted Programs (English)
PUPs are applications that have legitimate uses but have functions and behaviors that can be exploited against the user without the user’s consent. Learn about PUPs and how to contain them.
Argomenti: McAfee Labs

Proteggersi dai programmi potenzialmente indesiderati
PUPs are applications that have legitimate uses but have functions and behaviors that can be exploited against the user without the user’s consent. Learn about PUPs and how to contain them.
Argomenti: McAfee Labs

Come si sfrutta la debolezza del sistema operativo umano — Executive Summary
This executive summary provides an overview of social engineering as an attack vector. It lists the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.
Argomenti: McAfee Labs

Hacking the Human Operating System (English)
This in-depth report examines social engineering as an attack vector. It details the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.
Argomenti: McAfee Labs

BERserk: passare al contrattacco
Trust is no longer present when the privacy, integrity, and authenticity of our information is called into question. Learn how you can protect your company against attacks that attempt to exploit the BERserk vulnerability.
Argomenti: McAfee Labs

Abuso di fiducia
Attackers prey upon the institution of trust in many ways, with exploiting unsuspecting victims the primary pursuit. Learn how McAfee security technology can help protect against attacks seeking to abuse the trust your company has in its day-to-day operations.
Argomenti: McAfee Labs

McAfee Labs Threats Report: November 2014
McAfee Labs’ quarterly analysis of global email and web threats.
Argomenti: McAfee Labs

McAfee Labs Threats Report: August 2014
McAfee Labs’ quarterly analysis of key threat topics and trends.
Argomenti: McAfee Labs

Report McAfee Labs sulle minacce: Giugno 2014
Quarterly analysis of key threat topics and trends.
Argomenti: McAfee Labs

Net Losses: Estimating the Global Cost of Cybercrime (English)
Putting a number on the cost of cybercrime and cyberespionage is the headline, but the dollar figure begs important questions about the damage to the victims from the cumulative effect of losses in cyberspace. This report explores the economic impact of cybercrime including estimation, regional variances, IP theft, opportunity and recovery costs and the future of cybercrime.
Argomenti: McAfee Labs

Net Losses: Estimating the Global Cost of Cybercrime — Summary (English)
This report explores the economic impact of cybercrime including estimation, regional variances, IP theft, opportunity and recovery costs and the future of cybercrime
Argomenti: McAfee Labs

Jackpot! Money Laundering Through Online Gambling (English)
This in-depth report details a common way in which cyber thieves launder money – through online gambling sites.
Argomenti: McAfee Labs

Jackpot! Riciclaggio di denaro attraverso il gioco d'azzardo online — Relazione di sintesi
This Executive Summary highlights a common way in which cyber thieves launder money – through online gambling sites.
Argomenti: McAfee Labs

Report McAfee LABS sulle minacce: Quarto trimestre 2013
McAfee Labs’ quarterly analysis of key threat topics and trends.
Argomenti: McAfee Labs