Все публикации



Hide English Publications

McAfee Labs Threats Report: May 2015 (English)
McAfee Labs’ quarterly analysis of key threat topics and trends.
Темы: McAfee Labs

Protecting Against Firmware and BIOS Manipulation (English)
Policies, procedures, and products that can protect against firmware attacks.
Темы: McAfee Labs

Defeat Ransomware: Ensure Your Data Is Not Taken Hostage (English)
Learn how to stop ransomware before it strikes.
Темы: McAfee Labs

Protecting Against Adobe Flash Exploits (English)
A practical approach to detect and protect against Adobe Flash exploits.
Темы: McAfee Labs

Catch Me If You Can: Antics of a Polymorphic Botnet (English)
This in-depth report discusses the polymorphic worm W/32Worm-AAEH, the control infrastructure behind it, and what it took to take it down.
Темы: McAfee Labs

When Evolution Turns Dark (English)
Learn how to protect against polymorphic worms like W/32Worm-AAEH.
Темы: McAfee Labs

Отчет McAfee Labs об угрозах: Февраль 2015 г.
McAfee Labs’ quarterly analysis of key threat topics and trends.
Темы: McAfee Labs

Защита от уязвимостей реализации SSL на мобильных устройствах
Many mobile apps are vulnerable to man-in-the-middle attacks. Learn how to protect against them.
Темы: McAfee Labs

Как бороться с набором эксплойтов Angler
The Angler exploit kit has become one of the most popular and powerful attack kits. Learn how to protect against it.
Темы: McAfee Labs

Защита от потенциально нежелательных программ
PUPs are applications that have legitimate uses but have functions and behaviors that can be exploited against the user without the user’s consent. Learn about PUPs and how to contain them.
Темы: McAfee Labs

Hacking the Human Operating System (English)
This in-depth report examines social engineering as an attack vector. It details the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.
Темы: McAfee Labs

Взлом «операционной системы» человека — Краткая сводка
This executive summary provides an overview of social engineering as an attack vector. It lists the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.
Темы: McAfee Labs

Противодействие уязвимости BERserk
Trust is no longer present when the privacy, integrity, and authenticity of our information is called into question. Learn how you can protect your company against attacks that attempt to exploit the BERserk vulnerability.
Темы: McAfee Labs

Злоупотребление доверием
Attackers prey upon the institution of trust in many ways, with exploiting unsuspecting victims the primary pursuit. Learn how McAfee security technology can help protect against attacks seeking to abuse the trust your company has in its day-to-day operations.
Темы: McAfee Labs

McAfee Labs Threats Report: November 2014
McAfee Labs’ quarterly analysis of global email and web threats.
Темы: McAfee Labs

McAfee Labs Threats Report: August 2014
McAfee Labs’ quarterly analysis of key threat topics and trends.
Темы: McAfee Labs

Отчет McAfee Labs об угрозах: июнь 2014 г.
Quarterly analysis of key threat topics and trends.
Темы: McAfee Labs

Net Losses: Estimating the Global Cost of Cybercrime (English)
Putting a number on the cost of cybercrime and cyberespionage is the headline, but the dollar figure begs important questions about the damage to the victims from the cumulative effect of losses in cyberspace. This report explores the economic impact of cybercrime including estimation, regional variances, IP theft, opportunity and recovery costs and the future of cybercrime.
Темы: McAfee Labs

Net Losses: Estimating the Global Cost of Cybercrime — Summary (English)
This report explores the economic impact of cybercrime including estimation, regional variances, IP theft, opportunity and recovery costs and the future of cybercrime
Темы: McAfee Labs

Jackpot! Money Laundering Through Online Gambling (English)
This in-depth report details a common way in which cyber thieves launder money – through online gambling sites.
Темы: McAfee Labs