McAfee Labs

Read McAfee Labs blogs for the latest threat research, threat intelligence, and thought leadership from the Advanced Threat Research team.

McAfee Labs

Missing Hotel Room Key? Try Your Phone

If you are like me, there are times when you will misplace your hotel key. Times when you’re switching a bucket of ice between hands while searching your pockets or bag. Wondering if you’ve left the key in your room or possibly the lobby. Thinking “I’ve always got my phone ...

McAfee Labs

The Riskiest Web Domains Revealed – Mapping The Malweb

The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to our fourth annual Mapping the Mal Web report released today. A staggering fifty-six percent of all risky sites end in .COM! Researcher at our very own McAfee Labs analyzed more than 27 million websites to uncover ...

McAfee Labs

Stuxnet Update

Stuxnet has received a lot of attention since McAfee first blogged about it in July. This post will answer some of the frequently asked questions we’ve received. Q: What is Stuxnet? A: Stuxnet is a highly complex virus targeting Siemens’ SCADA software. The threat exploits a previously unpatched vulnerability in Siemens SIMATIC ...

McAfee Labs

Zeus Crimeware Toolkit

The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This bot has an amazing and rarely observed means of stealing personal information–by infecting users’ computers and capturing all the information entered on banking sites. Apart from stealing passwords, this bot ...

McAfee Labs

Remote iPhone Jailbreak Using PDF Exploit Should Serve as Wake-Up Call

Like many iPhone users, I “jailbreak” my iPhone. I do this for many reasons, but mainly for console-level access and the darn cool infosec tools that are available through Cydia. Like many iPhone users, I was quite happy when the Electronic Frontier Foundation (EFF) was able to get jailbreaking included ...

McAfee Labs

Remote Jackpot: Hacking ATMs

Isn’t it just everybody’s dream: to walk up to an ATM, swipe your card, get a flashy screen reading “We Have A Winner,” and watch the machine spew out all its money? That dream just became reality. At least in a great presentation from Barnaby Jack at the Black Hat ...

McAfee Labs

"Operation Aurora" Leading to Other Threats

Operation Aurora has received a lot of attention over the past couple of days.  To recap, Google, Adobe, and many other companies were attacked with code exploiting a zero-day vulnerability in Internet Explorer.  Since the announcement of this vulnerability (CVE-2010-0249), exploit code has been made public and already revised into ...

McAfee Labs

More Details on "Operation Aurora"

Earlier today, George Kurtz posted an entry, ‘Operation “Aurora” Hit Google, Others’,  on the McAfee’s Security Insight blog  The purpose of this blog is to answer questions about this particular attack; fill in some of the threat flow and McAfee coverage details. How were systems compromised? When a user manually ...

Subscribe to McAfee Securing Tomorrow Blogs