An Aware Child is Safer Online
A Parent’s Handy Primer on Cyber Vocabulary – Part IV Aaaaaand, we are back! *drum rolls* This week’s topic is...
Threat Actors Use Encrypted Office Binary Format to Evade Detection
This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...
Brazilian Banking Malware Hides in SQL Database
Spam is a plague that has given headaches to system administrators and users for years. A lot of spam tries...
What is a Rootkit?
A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit...
Don’t Believe These 6 Mobile Security Myths
Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits...
Trailing the Trojan njRAT
One Trojan that just won’t go away is the remote access tool njRAT. Microsoft recently took down a leading domain...
How to Spot and Protect Yourself from Fake Antivirus Software
Most of you know how important it is to have security software on your computers to stay protected from viruses, malware,...
Examining Your Very Own Sefnit Trojan
Most malware is created for economic purposes. To name just a few of our reports and blogs on this topic,...
In Memory of Peter Szor
Nov. 20: Update with details of memorial service at the end of this post. Earlier this week the security industry...
Botnet Control Servers Span the Globe
McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet. With millions of McAfee endpoints...