Featured Blogs
Android Malware Spreads Through QR Code
Last week, there was quite a buzz in the mobile-malware researchers community about a new Android malware. It came to...
Satanbot Employs VBScript to Create Botnet
Malware is on the rise. At the beginning of 2008, our malware collection had 10 million samples. Today we have...
The Day of the Golden Jackal – The Next Tale in the Stuxnet Files: Duqu Updated
Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the...
No Winners at QR Code Roulette
Last year a friend had a bright idea for a party game that involved a series of QR codes in...
Rooting Exploit for Android Works Silently
In our last blog about Android malware, we discussed the expanding threat landscape for Android malware. Recently, we received an...
Spitmo vs Zitmo: Banking Trojans Target Android
SpyEye and Zeus are probably the most prevalent and active Trojan “banker” families seen in the wild. (Bankers steal bank...
Why Does My Car Have Its Own Smartphone?
You would be surprised at the number of places you can find a GSM SIM card. Outside of your mobile phone,...
Dissecting Zeus for Android (or Is It Just SMS Spyware?)
Zeus, also known as ZBot, is one of best-known malware in the industry. The main purpose of this malware is...
Responses to Cybercrime in Japan and France
This week the Sorbonne University and the French Department of Justice hosted a meeting, the World and Development Institute (IMODEV) International...
Mac ‘Protector’: Another Fake-Alert in Disguise
It’s not breaking news that fake-alert Trojans infections are growing. But it’s worrying for Mac OS X users to find...
Fake-Alert Scams Growing Again
Fake-alert Trojans, also known as scareware, fool consumers by claiming imaginary threats, and insisting its victims purchase a product to...
I Smell a RAT: Java Botnet Found in the Wild
Most of today’s malware works on Windows and its apps, because it can affect a lot of people around the...
Drive-By Downloads Attack Adobe Zero-Day Flaw
Adobe released a security advisory warning the users of a zero-day vulnerability in Adobe Flash Player Versions 10.2.152.33 and earlier....
5, 4, 3, 2, 1: Osama Bin Laden Death Scams
I suppose this was inevitable. The reported death of Osama Bin Laden is just too good a lure for cybercriminals...
LizaMoon the Latest SQL-Injection Attack
Working in the security industry brings about a myriad of challenges. This is especially true for vendors. We must do...
Google Tool Cleans Up Mobile Malware ‘Dream’
Over the weekend Google released the Android Market Security Tool to help clean up devices infected with the DroidDream malware. The Android/DrdDream...
Xirtem Worm Hides in CAB/SFX Files
W32/Xirtem@@MM is a fast-spreading and active worm, discovered in late 2008, that uses a variety of methods to propagate. The...
Mobile NFC Features Raise Security Concerns
Yesterday, at the Web 2.0 Summit, Google’s CEO Eric Schmidt presented the Nexus S. This wasn’t just about a new...
Missing Hotel Room Key? Try Your Phone
If you are like me, there are times when you will misplace your hotel key. Times when you’re switching a...
The Riskiest Web Domains Revealed – Mapping The Malweb
The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to our fourth annual Mapping the Mal...
Stuxnet Update
Stuxnet has received a lot of attention since McAfee first blogged about it in July. This post will answer some of...
Zeus Crimeware Toolkit
The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This...
Remote iPhone Jailbreak Using PDF Exploit Should Serve as Wake-Up Call
Like many iPhone users, I “jailbreak” my iPhone. I do this for many reasons, but mainly for console-level access and...
Remote Jackpot: Hacking ATMs
Isn’t it just everybody’s dream: to walk up to an ATM, swipe your card, get a flashy screen reading “We...
"Operation Aurora" Leading to Other Threats
Operation Aurora has received a lot of attention over the past couple of days. To recap, Google, Adobe, and many...
More Details on "Operation Aurora"
Earlier today, George Kurtz posted an entry, ‘Operation “Aurora” Hit Google, Others’,  on the McAfee’s Security Insight blog The purpose...