Featured Blogs
Malware Disguised as Java Update: Careful What You Download!
All too often, cyber attacks are crimes of opportunity. This was exactly the case when late last week, hackers created...
Botnet Control Servers Span the Globe
McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet. With millions of McAfee endpoints...
Apps Tracking Your Location: Friendly or Creepy?
There is no denying the fact that the world has gone wireless. With the explosion of smartphones and the “bring...
IPS Countermeasures Fight Obfuscation, Evasion
Before the advent of intrusion detection systems (IDS) and intrusion prevention systems (IPS), firewalls served as the primary technology to...
Labs Paper Looks ‘Inside the World of the Citadel Trojan’
Zeus “banking” malware and its variants have been making headlines in recent months. One variant, the Citadel Trojan, has now...
Love, Relationships, and #SextRegret: It’s Time to Take Back the Web
What would you do if someone threatened to post risqué photos of you on the Internet? According to a new...
Evasion Techniques: Encoded JavaScript Attacks PDF Files
Last week I kicked off a series of blogs with a discussion of how an effective IPS solution can fight...
Fake Cleaning Apps in Google Play: an AutoRun Attack and More
Almost exactly one year ago, Google announced the addition of a “new layer to Android security,” a service codenamed Bouncer...
This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too
This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too Love is in the...
Analyzing the First ROP-Only, Sandbox-Escaping PDF Exploit
The winter of 2013 seems to be “zero-day” season. Right after my colleague Haifei Li analyzed the powerful Flash zero...
Top 5 Reasons To Participate in the McAfee Virtual Sales Kickoff
In 2013 we remain committed to investing in, growing with and optimizing for you, our channel partners. A prime example...
Digging Into the Sandbox-Escape Technique of the Recent PDF Exploit
As promised in our previous blog entry for the recent Adobe Reader PDF zero-day attack, we now offer more technical...
Just One of Many Internet Scams
A good friend of mine called me recently to ask what I knew about scams from online sales. He had...
Malware Behaves Oddly in Automated Analysis Environment
While testing malware recently, we got some logs from our automated analysis system showing a few samples that are only...
What is a Botnet?
The word botnet or bot is short for robot network. A botnet is a group of Internet-connected personal computers that...
Android Malware Goes Bollywood
We already know that mobile malware is growing at a fantastic rate, but we now see a new trend that...
An Overview of Messaging Botnets
In the quarterly McAfee Threats Reports we offer our readers some charts on the prevalence of messaging botnets. For the...
Travnet Trojan Could Be Part of APT Campaign
This blog post was written by Vikas Taneja. Attackers use all kinds of attack vectors to steal sensitive information from...
Tax Season Email Scam Aims to Steal from Uncle Sam
Every year around tax season, we see a huge spike in tax-related social engineering attacks. Social engineering is a type...
How to Protect Yourself from Tax Scams
Tax season is now upon us, and more than ever, we are opting for the convenience of filing taxes online...
VSkimmer Botnet Targets Credit Card Payment Terminals
April 2 This blog has been updated with McAfee’s NSP detection. See end of blog. While monitoring a Russian underground...
Online Safety for Kids – The App Your Kids are Using Now: Snapchat
The #1 question asked by parents when I present for McAfee’s Online Safety for Kids program, is “Where do I...
Multiple Java Exploits Hide in a Jar (File)
Exploits of the Java Runtime Environment (JRE) have been extensively used in drive-by-download toolkits such as Blackhole and Red Kit....
Phishing Threat Uses UTF-8 BOM in ZIP Signature to Evade Detection
This blog was written by Sanchit Karve. Last week, we noticed thousands of malware files in the wild that employ...
Turkish ‘Delete Virus’ Targets Facebook Users
Facebook continues to be a favorite target for attackers to spread fake wall-post messages or fake scams. Most of the...
One-Click Fraud Variant on Google Play in Japan Steals User Data
Last week McAfee Labs reported a series of “one-click fraud” malware on Google Play in Japan. We have been monitoring...
Fake Vertu App Infects Korean and Japanese Android Users
A new threat has surfaced targeting users in Korea and Japan, but this attack, unlike others making the news, is...