Raj Samani is Chief Scientist and McAfee Fellow for cybersecurity firm McAfee. He has assisted multiple law enforcement agencies in cybercrime cases, and is a special advisor to the European Cybercrime Centre in The Hague. Samani has been recognized for his contribution to the computer security industry through numerous awards, including the Infosecurity Europe hall of Fame, Peter Szor award, and Intel Achievement Award, among others. He is the coauthor of the book "Applied Cyber Security and the Smart Grid" and the "CSA Guide to Cloud Computing," as well as technical editor for numerous other publications.

Raj Samani Blog Feed

More from Raj Samani

McAfee Labs

We’ve Been Hacked! Okay, I’ll Deal With It Next Week

That was the message I got from a CEO when we presented evidence that their organization had been compromised and the attackers had been free to roam for months, resulting in the theft of terabytes worth of data. Actually, the exact words were “So we’ve been hacked, eh? Well, it’s ...

Executive Perspectives

What Morpho Means: Why Hackers Target Intellectual Property And Business-Confidential Information

A quiet, professional cyberespionage group steals what every company wants to keep secret: valuable information that drives business. Welcome to the new normal. Corporate cyberespionage made the front page yesterday with the news of Morpho, also known as Wild Neutron. Regardless of what you call it, these revelations were the ...

McAfee Labs

Update on the Beebone Botnet Takedown

On April 8, the takedown operation for the polymorphic botnet known as Beebone successfully concluded. This action redirected traffic from infected hosts to a sinkhole operated by the Shadowserver Foundation. In addition to halting additional infections and the continued morphing of the W32/Worm-AAEH worm, the sinkhole allows McAfee Labs and ...

McAfee Labs

Takedown Stops Polymorphic Botnet

Several global law enforcement agencies—with assistance from McAfee —this week successfully dismantled the “Beebone” botnet behind a polymorphic worm known by McAfee as W32/Worm-AAEH. The purpose of this worm is to facilitate downloading other malware, including ZBot banking password stealers, Necurs and ZeroAccess rootkits, Cutwail spambots, fake antivirus, and ransomware. ...

McAfee Labs

Hacking the Human OS: A Report on Social Engineering

Why are data breaches so commonplace?  Whether the attacks are against the energy sector as reported July 2014[i] with over 1,000 energy companies in North America and Europe reported to have been compromised.  To other attacks targeting other sectors (e.g. Operation Troy, Operation High Roller Nightdragon, etc.) it would appear ...

McAfee Labs

The Rise of Backdoor-FCKQ (CTB-Locker)

By Raj Samani (@Raj_Samani) and Christiaan Beek (@ChristiaanBeek) In the McAfee Labs Threats Report published in November 2014, Senior Vice President Vincent Weafer commented that 2014 will be remembered as “the year of shaken trust.” Indeed almost every threat measured saw notable increases in Q3 that pointed to a rather ...

Enterprise

The role of private sector in combatting cybercrime

This week we announced the signing of a Memorandum of Understanding (MoU) with the European Cybercrime Centre (EC3) that combines our skills in the war against cybercrime. This agreement demonstrates our commitment to addressing the growing menace that each and every one of us faces in the digital world today. ...

Enterprise

3 key security challenges for the Internet of Things

What challenges pose the biggest threat to the Internet of Things? The Internet of Things (IoT) is already starting to give rise to real-world applications, from connected homes and cars to health monitoring and smart utility meters. Analyst Gartner predicts there will be 26 billion IoT devices – excluding PCs, ...

Enterprise

4 hidden economic costs of cybercrime

There are many obvious and headline-grabbing costs of cybercrime. There are many obvious and headline-grabbing costs of cybercrime. In the past few months alone there have been numerous high-profile data security breaches where hackers have obtained tens of millions of customer details, ranging from credit card numbers to medical records. ...

McAfee Labs

Operation Dragonfly Imperils Industrial Protocol

Recent headlines (here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, reportedly destroying a fifth of Iran’s nuclear centrifuges. Recent reports about Operation ...

Subscribe to McAfee Securing Tomorrow Blogs