Все публикации



Hide English Publications

McAfee Labs Threats Report: August 2015 (English)
McAfee Labs’ quarterly analysis of key threat topics and trends.
Темы: McAfee Labs

Stop Data Exfiltration (English)
Data exfiltration tactics and techniques used by cyber thieves and how to combat data theft.
Темы: McAfee Labs

Protecting Against GPU Malware (English)
Policies, procedures, and products that can protect against GPU attacks.
Темы: McAfee Labs

McAfee Labs Threats Report: May 2015 (English)
McAfee Labs’ quarterly analysis of key threat topics and trends.
Темы: McAfee Labs

Protecting Against Firmware and BIOS Manipulation (English)
Policies, procedures, and products that can protect against firmware attacks.
Темы: McAfee Labs

Defeat Ransomware: Ensure Your Data Is Not Taken Hostage (English)
Learn how to stop ransomware before it strikes.
Темы: McAfee Labs

Protecting Against Adobe Flash Exploits (English)
A practical approach to detect and protect against Adobe Flash exploits.
Темы: McAfee Labs

Catch Me If You Can: Antics of a Polymorphic Botnet (English)
This in-depth report discusses the polymorphic worm W/32Worm-AAEH, the control infrastructure behind it, and what it took to take it down.
Темы: McAfee Labs

When Evolution Turns Dark (English)
Learn how to protect against polymorphic worms like W/32Worm-AAEH.
Темы: McAfee Labs

Отчет McAfee Labs об угрозах: Февраль 2015 г.
McAfee Labs’ quarterly analysis of key threat topics and trends.
Темы: McAfee Labs

Защита от уязвимостей реализации SSL на мобильных устройствах
Many mobile apps are vulnerable to man-in-the-middle attacks. Learn how to protect against them.
Темы: McAfee Labs

Как бороться с набором эксплойтов Angler
The Angler exploit kit has become one of the most popular and powerful attack kits. Learn how to protect against it.
Темы: McAfee Labs

Защита от потенциально нежелательных программ
PUPs are applications that have legitimate uses but have functions and behaviors that can be exploited against the user without the user’s consent. Learn about PUPs and how to contain them.
Темы: McAfee Labs

Hacking the Human Operating System (English)
This in-depth report examines social engineering as an attack vector. It details the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.
Темы: McAfee Labs

Взлом «операционной системы» человека — Краткая сводка
This executive summary provides an overview of social engineering as an attack vector. It lists the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.
Темы: McAfee Labs

Противодействие уязвимости BERserk
Trust is no longer present when the privacy, integrity, and authenticity of our information is called into question. Learn how you can protect your company against attacks that attempt to exploit the BERserk vulnerability.
Темы: McAfee Labs

Злоупотребление доверием
Attackers prey upon the institution of trust in many ways, with exploiting unsuspecting victims the primary pursuit. Learn how McAfee security technology can help protect against attacks seeking to abuse the trust your company has in its day-to-day operations.
Темы: McAfee Labs

McAfee Labs Threats Report: November 2014
McAfee Labs’ quarterly analysis of global email and web threats.
Темы: McAfee Labs

McAfee Labs Threats Report: August 2014
McAfee Labs’ quarterly analysis of key threat topics and trends.
Темы: McAfee Labs

Отчет McAfee Labs об угрозах: июнь 2014 г.
Quarterly analysis of key threat topics and trends.
Темы: McAfee Labs