Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

IPS Countermeasures Fight Obfuscation, Evasion

Before the advent of intrusion detection systems (IDS) and intrusion prevention systems (IPS), firewalls served as the primary technology to...

McAfee Labs

IoT Zero-Days – Is Belkin WeMo Smart Plug the Next Malware Target?

Effective malware is typically developed with intention, targeting specific victims using either known or unknown vulnerabilities to achieve its primary...

McAfee Labs

IoT Devices: The Gift that Keeps on Giving… to Hackers

McAfee Advanced Threat Research on Most Hackable Gifts You’ve probably noticed the recent increase in Internet connected drones, digital assistants,...

McAfee Labs

Invisible Adware: Unveiling Ad Fraud Targeting Android Users

Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and it’s no surprise...

McAfee Labs

Introduction and Application of Model Hacking

Catherine Huang, Ph.D., and Shivangee Trivedi contributed to this blog. The term “Adversarial Machine Learning” (AML) is a mouthful!  The...

Mobile Security McAfee Labs

Introducing App Reputation for Android Apps

McAfee has always been in the forefront of finding new ways to secure our customers against threats and risks posed...

McAfee Labs

Internet Explorer Zero Day Offers Unusual Case Study

While analyzing a recent Internet Explorer zero-day vulnerability, CVE-2014-0322 (containing the Flash sample hash b9c9dab0fd30418884800afebbaba4d99f4526ef0c9a47972a20ab20fed0a06d), we noticed the exploit makes...

McAfee Labs

Intelligence in the Enterprise

Intelligence became an integral military discipline centuries ago. More recently, this practice evolved into what is called Intelligence Preparation of the Battlefield,...

McAfee Labs

InstallCube: How Russian Programmers Turn Adware Into Cash

We often observe applications bundled with ad-displaying programs to generate revenue for those products. These are not necessarily unethical, but...

McAfee Labs

Instagram credentials Stealers: Free Followers or Free Likes

Authored by Dexter Shin  Instagram has become a platform with over a billion monthly active users. Many of Instagram’s users...

McAfee Labs

Instagram credentials Stealer: Disguised as Mod App

Authored by Dexter Shin  McAfee’s Mobile Research Team introduced a new Android malware targeting Instagram users who want to increase...

McAfee Labs

Inside Adobe Reader Zero-Day Exploit CVE 2011-2462

Recently a critical vulnerability has been identified in Adobe Reader X and Adobe Acrobat X Versions 10.1.1 and earlier for...

McAfee Labs

Information Operations an Integral Part of Cyberwarfare

Weapons and the skills to use them are not the only decisive elements in warfare. Rhetoric and imagery are important,...

Life at McAfee

Inclusion Drives Innovation: An Employee’s Perspective on Being Differently Abled

By Karla Jackson, Digital Media Specialist, McAfee “With Our People at The Heart, We Are McAfee.” If you make your...

McAfee Labs

In NTDLL I Trust – Process Reimaging and Endpoint Security Solution Bypass

Process Reimaging Overview The Windows Operating System has inconsistencies in how it determines process image FILE_OBJECT locations, which impacts non-EDR...

McAfee Labs

In Memory of Peter Szor

Nov. 20: Update with details of memorial service at the end of this post. Earlier this week the security industry...

McAfee Labs

Improve Protection Against Cyberattacks Through Shared Threat Intelligence

This blog post was written by Rick Simon. At the RSA Conference 2016 in San Francisco, Chris Young, GM and...

McAfee Labs

Imposter Netflix Chrome Extension Dupes 100k Users

Authored by Oliver Devane, Vallabh Chole, and Aayush Tyagi  McAfee has recently observed several malicious Chrome Extensions which, once installed,...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top