Featured Blogs
Iranian Keylogger Marmoolak Enters via Backdoor
Targeted attacks have several stages, sometimes called the APT kill chain. At McAfee Labs we prefer the model described by...
Strike a Pose: Blackshades Malware Spies Through Your Webcam
In the old days, one simply had to draw their blinds to avoid peeping toms from spying on their private...
Information Operations an Integral Part of Cyberwarfare
Weapons and the skills to use them are not the only decisive elements in warfare. Rhetoric and imagery are important,...
Ransomware Goes Mobile
The dominance of mobile devices has given hackers a growing market to chase after, with many of the same tools...
7 Soft Skills Critical to Parenting Today’s Digital Kids
We write a lot about the tech basics—or the hard skills—you need to excel in your superhero job as...
How Hackers are Using Heartbleed to Trick You into Infecting Your Computer
Heartbleed, a vulnerability affecting nearly 70% of websites on the Internet, was discovered two months ago. It was big. It...
Teens’ Online Behavior Can Get Them in Trouble
Do you really know what your kids are doing all the time? Probably not, unless you’re a stalker (just kidding)....
Massive Law Enforcement Operation Tells two Malware Variants it’s Game Over
On Monday, the United States Department of Justice announced an international law enforcement effort to take out a massive botnet—a...
A Glance Into the Neutrino Botnet
Lately, we have seen a number of communications through our automated framework from the Neutrino botnet. While analyzing this botnet,...
