Featured Blogs
NGRBot Spreads Via Chat
NGRBot is a worm that propagates through chat messengers, the Internet Relay Chat channel, social networking sites etc. It steals...
Multiplatform Fake AV Uses Different GUIs
Since the beginning of October we have seen a variant of fake antivirus malware that belongs to the FakeRean family...
Update: NGRBot Posing as Skype Drops Ransomware With Fake McAfee Logo
This blog was updated on October 15. See the end of this file. We recently received a sample of the...
A Quick Analysis of the Flash Player Opcode-Verifying Code Execution Vulnerability
On October 12, McAfee Labs learned of proof-of-concept code exploiting a newly patched Flash Player vulnerability. Adobe had patched this...
Actress Sofia Vergara’s Personal Photos Hacked or Stolen Via Mobile
In my line of work I get emails such as this one: “Hi Robert, I’m not sure if you saw...
Hack the Vote: Pros and Cons of Electronic Voting
After 17 months and billions in campaign spending, it was up to the scores of American people who flooded churches,...
The Top 12 Scams Of Christmas To Watch Out For
McAfee Latest 2012 Holiday-Related Online Scams and Security Tips for Consumers The holidays are just around the corner and amid...
Narilam Trojan Targets Iranian Financial Software
Iranian infrastructure has been on the radar of cyberattackers for a couple of years. We have already witnessed organized and...
Secret Lives of Indian Teens- A McAfee Survey
“So where’s your daughter?” “Oh, she is in her room, on the net,” replied the indulgent Mother. “These kids have...
New Labs Report: ‘Analyzing Project Blitzkrieg’
Project Blitzkrieg, a current attack on US financial institutions, got a lot of media attention following a blog posting by...
W32/Autorun Worm: A Nasty Bug for Your Computer
What do you think of when you hear the word “malware”? Most people think of the general term “virus”–something that...
YouTube Video Scam Targets Facebook Users
Be advised cybercriminals are at it again, leveraging the popularity of Facebook and YouTube to scam consumers.We have seen several...
If You Deploy Only Antivirus, It Will Cost You More and Make You Less Secure
Everyone’s looking to shave their IT budgets, manage fewer vendors and streamline. The plethora of low cost and sometimes free...
Is Your SNS Addiction Getting Out of Hand? – All Names Aren’t Cool
The news that went viral on social networking sites last week made me smile and shake my head and say,...
Internet Safety Resolutions for 2013
My daughter loves forming New Year resolutions! Every January 01, she diligently pens down her resolutions (always interesting ones!) on...
Getting Down With The Kids – Internet Slang for Dummies!
Whenever my boys come home with a new buzz word or saying, I instantly feel like a dinosaur. Whether it...
Java Zero-Day Vulnerability Pushes Out Crimeware
This blog was updated on January 14. See the end of the file. A new Java zero-day vulnerability is spreading...
How to Protect Your Devices from a Fast Spreading Java Virus
Last week, a new security issue surfaced for a popular programming language known as Java. This Java security issue is...
The Future of Hacktivism and Anonymous
After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of...
Malware Disguised as Java Update: Careful What You Download!
All too often, cyber attacks are crimes of opportunity. This was exactly the case when late last week, hackers created...
Botnet Control Servers Span the Globe
McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet. With millions of McAfee endpoints...
Apps Tracking Your Location: Friendly or Creepy?
There is no denying the fact that the world has gone wireless. With the explosion of smartphones and the “bring...
IPS Countermeasures Fight Obfuscation, Evasion
Before the advent of intrusion detection systems (IDS) and intrusion prevention systems (IPS), firewalls served as the primary technology to...
Labs Paper Looks ‘Inside the World of the Citadel Trojan’
Zeus “banking” malware and its variants have been making headlines in recent months. One variant, the Citadel Trojan, has now...
Love, Relationships, and #SextRegret: It’s Time to Take Back the Web
What would you do if someone threatened to post risqué photos of you on the Internet? According to a new...
Evasion Techniques: Encoded JavaScript Attacks PDF Files
Last week I kicked off a series of blogs with a discussion of how an effective IPS solution can fight...
Fake Cleaning Apps in Google Play: an AutoRun Attack and More
Almost exactly one year ago, Google announced the addition of a “new layer to Android security,” a service codenamed Bouncer...
