Featured Blogs
Updates and Mitigation to Microsoft Office Zero-Day Threat (CVE-2013-3906)
On November 5, Microsoft posted Security Advisory 2896666. This vulnerability, discovered by Haifei Li of McAfee Labs, affects multiple versions of Microsoft...
Solving the Mystery of the Office Zero-Day Exploit and DEP
On November 5 McAfee Labs blogged about a Microsoft Office zero-day attack that we spotted in the wild. In another...
Scrooge’s 12 Scams of the Holidays
They’re baaaack! Actually, they never left—Scrooge’s little trolls work hard all year, scheming and scamming to steal holiday presents—or at...
Cracking Passwords is as Easy as “123”
One month after announcing a corporate data raid affecting 2.9 million of their users, Adobe has found the extent of...
Becoming ‘InstaFamous’ – The Apps the Kids are Using Now: Instagram LikeBots
InstaFamous: A person who is famous due to a high amount of followers on Instagram. The Instagram ‘popular’ page boasts...
In Memory of Peter Szor
Nov. 20: Update with details of memorial service at the end of this post. Earlier this week the security industry...
Japanese Chat App for Android Steals Phone Numbers
Update, December 5 The developer of the app Machin Chat has contacted McAfee and reported that the collection of phone...
JavaScript Apps on Google Play Steal Korean Phone Numbers
In a recent blog, McAfee Labs reported on suspicious JavaScript-based Android chat applications for Japanese users. These apps were found...
More Japanese Chat Apps on Google Play Steal Phone Numbers
In two recent blogs, McAfee Labs described Japanese and Korean Android apps on Google Play that steal a mobile device’s...
Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing!
An Indian investigative portal Cobrapost, recently released a report on alleged online reputation smearing/management/campaigns designed to gain/destroy political capital for who ever was...
Helping Your Daughter Handle Mean Girls Online
It was an ordinary Tuesday after school. Sixteen year-old Allison was texting back and forth with her best friend Katie; both were...
Electronics in Flight: How Harmful are Mobile Devices to Your Aircraft?
We all know the drill: before takeoff and landing the flight attendants do a final safety inspection, walking up and...
Analyzing the Recent Windows Zero-Day Escalation of Privilege Exploit
Recently we caught a malicious sample that exploits a PDF vulnerability–CVE-2013-3346, we believe–and executes after a use-after-free condition occurs. During...
Flashlight App Steals Data, Leaves Users in Dark
Ahh, the good old days—when flashlights were simple, handheld devices, used to help light your way… Not light producing mobile...
McAfee LiveSafe Knocks it out of the Park as PCMag Editors’ Choice
I’ve said it for some time—the world today is becoming increasingly connected, both on-and-offline. Everything from our shopping to banking,...
‘Pony’ Botnet Gallops Off With 2 Million Passwords
In what appears to be a worldwide attack, cybercriminals have successfully stolen 2 million account passwords with a botnet known...
Suspicious Apps on Google Play Leak Google Account IDs
The Google account ID (or account name), which in most cases is a Gmail address, is one of the key...
WhatsApp With That? Security Flaw in Mobile Messaging Apps
Mobile phone calls and text messages seem to be going the way of the dinosaurs. In their place, a plethora...