Intel Security

View All Publications

Filter Content:

Verizon 2016 Data Breach Investigations Report

Intel Security contributed to Verizon’s 2016 Data Breach Investigations Report, which provides a comprehensive analysis of data breach patterns seen in 2015.
Topics: McAfee Labs

How to Protect Against Ransomware

Learn how Intel Security products leverage a number of technologies that help prevent ransomware.
Topics: McAfee Labs

Understanding Ransomware and Strategies to Defeat it

In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. Learn how Intel Security products leverage a number of technologies that help prevent ransomware.
Topics: McAfee Labs

McAfee Labs Threats Report: March 2016

McAfee Labs’ quarterly analysis of key threat topics and trends.
Topics: McAfee Labs

Operationalizing Threat Intelligence

Behind just about every legitimate alert your IT security receives is an adversary using multiple attack techniques to penetrate your infrastructure and compromise your vital data assets or systems. Today’s targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.
Topics: McAfee Labs

Stopping Backdoor Trojans

The Adwind Trojan that targets typically arrives as an email attachment or opens an infected Microsoft Word document. Find out how Intel Security products can protect against backdoor Trojans such as Adwind.
Topics: McAfee Labs

Protecting Against Firmware and BIOS Manipulation

Policies, procedures, and products that can protect against firmware attacks.
Topics: McAfee Labs

When Evolution Turns Dark

Learn how to protect against polymorphic worms like W/32Worm-AAEH.
Topics: McAfee Labs

McAfee Labs Threats Report: November 2015

McAfee Labs’ quarterly analysis of key threat topics and trends.
Topics: McAfee Labs

Protecting Against Fileless Malware

This solution brief discusses the three types of fileless malware that evade detection by reducing the storage of binaries on disk and operate on the memory of the compromised host.
Topics: McAfee Labs