Featured Blogs
An Overview of Messaging Botnets
In the quarterly McAfee Threats Reports we offer our readers some charts on the prevalence of messaging botnets. For the...
Android Malware Goes Bollywood
We already know that mobile malware is growing at a fantastic rate, but we now see a new trend that...
What is a Botnet?
The word botnet or bot is short for robot network. A botnet is a group of Internet-connected personal computers that...
Malware Behaves Oddly in Automated Analysis Environment
While testing malware recently, we got some logs from our automated analysis system showing a few samples that are only...
Just One of Many Internet Scams
A good friend of mine called me recently to ask what I knew about scams from online sales. He had...
Digging Into the Sandbox-Escape Technique of the Recent PDF Exploit
As promised in our previous blog entry for the recent Adobe Reader PDF zero-day attack, we now offer more technical...
Top 5 Reasons To Participate in the McAfee Virtual Sales Kickoff
In 2013 we remain committed to investing in, growing with and optimizing for you, our channel partners. A prime example...
Analyzing the First ROP-Only, Sandbox-Escaping PDF Exploit
The winter of 2013 seems to be “zero-day” season. Right after my colleague Haifei Li analyzed the powerful Flash zero...
This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too
This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too Love is in the...
Fake Cleaning Apps in Google Play: an AutoRun Attack and More
Almost exactly one year ago, Google announced the addition of a “new layer to Android security,” a service codenamed Bouncer...