Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

New Zero-Day Attack Copies Earlier Flash Exploitation

Late on July 10, Microsoft released a blog post disclosing that they were aware of a zero-day attack in the...

Mobile Security McAfee Labs

Adult Voice-Service Apps on Google Play Japan Charge Users Without Notice

McAfee has reported on increasing fraudulent Android applications on Google Play in Japan this year, including one-click fraud applications and...

McAfee Labs

Malware Manipulates Procedure Prologue and Epilogue to Evade Security

Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers,...

Mobile Security McAfee Labs

Android Master-Key Malware Already Blocked by McAfee Mobile Security

The Android Master Key vulnerability, which was first reported by BlueBox Security, has been big news this month. McAfee explained...

Mobile Security McAfee Labs

Introducing App Reputation for Android Apps

McAfee has always been in the forefront of finding new ways to secure our customers against threats and risks posed...

Mobile Security McAfee Labs

Japanese One-Click Scammers Abuse Mobile Traffic Exchange Service

McAfee has been monitoring and reporting extensively on one-click-fraud malware for Android in Japan this year. These attacks, primarily on...

McAfee Labs

Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code

Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware...

McAfee Labs

Java Back Door Acts as Bot

The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found...

McAfee Labs

Android App Contains Windows Worm

When developers are unaware of security they open the door to threats against their customers and users. We are not...

McAfee Labs

Cidox Trojan Spoofs HTTP Host Header to Avoid Detection

Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP...

McAfee Labs

Andromeda Botnet Hides Behind AutoIt

Last month, I posted a blog about an increase in the use of AutoIt scripts by malware authors to carry...

McAfee Labs

Vertexnet Botnet Hides Behind AutoIt

Recently we found some new malware samples using AutoIt to hide themselves. On further analysis we found that those sample...

McAfee Labs

Ramnit Malware Creates FTP Network From Victims’ Computers

This blog post was written by Vikas Taneja. The Ramnit worm appeared in 2010. Within a year more than eight...

McAfee Labs

Hacking Summit Names Nations With Cyberwarfare Capabilities

In 2009, I read with great interest a paper published in the Journal of International Security Affairs titled The Art...

McAfee Labs

Quarian Group Targets Victims With Spearphishing Attacks

This blog post was written by Rahul Mohandas. The current generation of targeted attacks are getting more sophisticated and evasive....

McAfee Labs

Periodic Connections to Control Server Offer New Way to Detect Botnets

A number of recent botnets and advanced threats use HTTP as their primary communications channel with their control servers. McAfee...

McAfee Labs

McAfee Labs Detects Zero-Day Exploit Targeting Microsoft Office

Last Thursday morning (October 31), our Advanced Exploit Detection System (AEDS), which we discussed in an earlier post, detected a...

McAfee Labs

Solving the Mystery of the Office Zero-Day Exploit and DEP

On November 5 McAfee Labs blogged about a Microsoft Office zero-day attack that we spotted in the wild. In another...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top