Featured Blogs
Top 5 Reasons To Participate in the McAfee Virtual Sales Kickoff
In 2013 we remain committed to investing in, growing with and optimizing for you, our channel partners. A prime example...
Analyzing the First ROP-Only, Sandbox-Escaping PDF Exploit
The winter of 2013 seems to be “zero-day” season. Right after my colleague Haifei Li analyzed the powerful Flash zero...
This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too
This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too Love is in the...
Fake Cleaning Apps in Google Play: an AutoRun Attack and More
Almost exactly one year ago, Google announced the addition of a “new layer to Android security,” a service codenamed Bouncer...
Evasion Techniques: Encoded JavaScript Attacks PDF Files
Last week I kicked off a series of blogs with a discussion of how an effective IPS solution can fight...
Love, Relationships, and #SextRegret: It’s Time to Take Back the Web
What would you do if someone threatened to post risqué photos of you on the Internet? According to a new...
Labs Paper Looks ‘Inside the World of the Citadel Trojan’
Zeus “banking” malware and its variants have been making headlines in recent months. One variant, the Citadel Trojan, has now...
IPS Countermeasures Fight Obfuscation, Evasion
Before the advent of intrusion detection systems (IDS) and intrusion prevention systems (IPS), firewalls served as the primary technology to...
Apps Tracking Your Location: Friendly or Creepy?
There is no denying the fact that the world has gone wireless. With the explosion of smartphones and the “bring...
Botnet Control Servers Span the Globe
McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet. With millions of McAfee endpoints...