Featured Blogs
Inside Adobe Reader Zero-Day Exploit CVE 2011-2462
Recently a critical vulnerability has been identified in Adobe Reader X and Adobe Acrobat X Versions 10.1.1 and earlier for...
Fighting Mobile Phone Impersonation and Surveillance
Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased...
Almost 5% of Smartphones Lost Every Year
McAfee and Ponemon Institute recently released “The Lost Smartphone Problem,” a study that attempts to determine how many employees’ smartphones...
Android DIY DoS App Boosts Hacktivism in South America
Hacktivism has become very popular in recent years; one of its leading agents is the online community Anonymous. Hacktivist groups...
Google Code Projects Host Android Malware
[March 1: See update at end] Google Code is a well-known platform that provides a collaborative environment for developers working...
Don’t Let Location-Based Services Put You in Danger
Location-based services utilize geo-location information to publish your whereabouts. In some cases, these services can also provide discounts or freebies...
Android Malware Pairs Man-in-the-Middle With Remote-Controlled Banking Trojan
Based on the Android malware that we’ve seen so far, one of the principal motivations to develop and spread malware...
Darkshell DDOS Botnet Evolves With Variants
Darkshell is a distributed denial of service (DDoS) botnet targeting Chinese websites. It was found in 2011 and was first...
Android Malware Promises Video While Stealing Contacts
Recently we discovered a new Android Trojan in the official Google Play market that displays a video downloaded from the...
Hacker Leaves Online Trail, Loses Anonymity
Since March 20, the @Anonw0rmer Twitter account has been silent. Its owner, w0rmer, is known as a member of the...
Digging Into the Nitol DDoS Botnet
Nitol is a distributed denial of service (DDoS) botnet that seems to be small and not widely known. It mostly...
Latest SpyEye Botnet Active and Cheaper
On April 16, we found a Pastebin entry selling the latest version of the infamous SpyEye botnet (Version 1.3.48) for...
CVE-2012-0158 Exploit in the Wild
Since last week, we have seen many specially crafted files exploiting CVE-2012-0158, a vulnerability in MSCOMCTL.OCX in Microsoft Office and...
Mobile and Phishing – Why It’s More Dangerous
Phishing occurs when scammers send emails that appear to have been sent by legitimate, trusted organizations in order to lure...
Pastebin Shares Botnet Source Code
Few days back, we found another Pastebin entry that contains a source which looks to be malicious botnet code. As...
‘Android/NotCompatible’ Looks Like Piece of PC Botnet
A lot of recent attacks on Android users are attributed to fake websites of popular applications such as Cut the...
Evolution of Android Malware: IRCBot Joins the Party
We all know how fast the smart phone market is growing. Along with it, the complexity and the numbers of...
What Does It Take To Be Digitally Secure?
Let’s get one thing straight: it’s no longer possible to deny that your life in the physical world and your...
Jumping Into the Flames of Skywiper
There has been quite a bit of analysis and speculation about the Flamer/Skywiper threat. As we started to analyze this...
Spreading the Flame: Skywiper Employs ‘Windows Update’
Microsoft has issued Security Advisory 2718704, in which the company disclosed that it recently became aware of the Flamer/Skywiper threat,...
‘Bioskits’ Join Ranks of Stealth Malware
We have seen many discussions of the MyBios “Bioskit” discovered at the end of 2011. MyBios was the first malware...
Operation High Roller Raises Financial Fraud Stakes
Earlier today Guardian Analytics and McAfee released the joint report “Dissecting Operation High Roller,” which describes a new breed of...
Combating Malware and Advanced Persistent Threats
In the past decade, the security industry has seen a constant rise in the volume of malware and attacks associated...
Facebook Bot Spreads Through Chat Messengers [Updated]
Update from Facebook: The Facebook security team been actively tracking this botnet and providing McAfee AV to the victims (via...
Malicious Websites – The Web is a Dangerous Place
McAfee’s latest Threats Report shows a growth in malicious websites replacing botnets as the primary infection mechanism. This means that...
McAfee Most Dangerous Celebrity 2012 – And The Riskiest Are…
Emma Watson has replaced Heidi Klum as McAfee’s 2012 Most Dangerous Celebrity to search for online. For the sixth year...
‘Police Ransomware’ Preys on Guilty Consciences
“Police ransomware” is big business, generating millions of euros for organized criminal groups. In May, at Europol’s headquarters in The...
