Search Results

Identity Protection Mobile and IoT Security

What Are The Risks Of A Lost Or Stolen Mobile Device?

Have you ever thought about what would happen if you lost your mobile phone? These days we rely on our mobile phones more than ever. For a lot of us, it can also be a nightmare if it’s lost, stolen or hacked, especially since today it’s become our most personal ...

Enterprise

Attack of the Phones: Combating Cyber Threats in the Era of Mobile Commerce

One of the hottest topics at this year’s Internet Retailer Conference and Expo was mobile commerce and, by extension, mobile payment technology. By lumping payment methods, loyalty cards, and coupons all into one location, services like Google Wallet, Passbook and ISIS™ make it easier than ever to shop online. Customers ...

McAfee Labs

‘Bioskits’ Join Ranks of Stealth Malware

We have seen many discussions of the MyBios “Bioskit” discovered at the end of 2011. MyBios was the first malware to successfully infect the Award BIOS and survive the reboot. It was first discovered by a Chinese security company; many other security vendors published detailed analyses after that. We have ...

McAfee Labs

Jumping Into the Flames of Skywiper

There has been quite a bit of analysis and speculation about the Flamer/Skywiper threat. As we started to analyze this threat, we knew from the very beginning that this was going to be a giant undertaking and potentially very long term. Now we want to pause to help the people ...

McAfee Labs

‘Android/NotCompatible’ Looks Like Piece of PC Botnet

A lot of recent attacks on Android users are attributed to fake websites of popular applications such as Cut the Rope, Instagram, Angry Birds, or Grand Theft Auto III. However, the very recently discovered malware NotCompatible uses a distribution method not previously seen in the mobile world. The malware hacks ...

Mobile and IoT Security

Mobile and Phishing – Why It’s More Dangerous

Phishing occurs when scammers send emails that appear to have been sent by legitimate, trusted organizations in order to lure recipients into clicking links and entering login data and other credentials. SMiShing is a version of phishing in which scammers send text messages rather than emails, which, as with phishing ...

McAfee Labs

Darkshell DDOS Botnet Evolves With Variants

Darkshell is a distributed denial of service (DDoS) botnet targeting Chinese websites. It was found in 2011 and was first analyzed by Arbor Networks. McAfee Labs recently analyzed a few new samples that turned out to be variants of Darkshell, and we found extensive variations in network traffic and control ...

McAfee Labs Executive Perspectives

RDP+RCE=Bad News (MS12-020)

See March 15 and 16 updates at the end of this blog. —————————————————-   The March Security Bulletin release from Microsoft was relatively light in volume. Out of the six bulletins released, only one was rated as Critical. And for good reason. MS12-020 includes CVE-2012-0002. This flaw is specific to the Remote ...

Enterprise

PayPal Phishing Scams & E-Payment Security

I’m a huge fan of PayPal and use it on a regular basis – it’s linked to my bank account and credit cards, and it has a lot of my close friends and family’s shipping addresses for easy gift giving.  So it’s no wonder that I get a lot of ...

McAfee Labs

Google Code Projects Host Android Malware

[March 1: See update at end] Google Code is a well-known platform that provides a collaborative environment for developers working on open source projects. It’s also a target for malware developers. Contrary to what you may think, this is not the first time that Google Code has been used to ...

Subscribe to McAfee Securing Tomorrow Blogs