What’s the Deal with Mirai? A Rundown on one of the Biggest Botnets
Every once in a while, a type of malware become so effective and prevalent that it dominates headlines for weeks....
Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets
Charles Strite, according to Lemelson-MIT, first introduced the modern toaster in 1926. It was, and remains to this day, a...
A Dummies Guide to ‘Insider Trading’ via Botnet, Part 2
This post, the second of two parts, was written by Christiaan Beek, Raj Samani, and Shane Shook. In our first post,...
A Dummies Guide to ‘Insider Trading’ via Botnet
This post, the first of two parts, was written by Raj Samani, Christiaan Beek, and Shane Shook. Want to spread...
Japanese Banking Trojan Shifu Combines Malware Tools
In recent weeks, McAfee Labs has analyzed a recently discovered banking Trojan that combines elements from multiple malware tools. Shifu...
Social Media Swamped by Social Botnets
As anyone with a newsfeed will tell you, fake social media accounts have been on the rise in recent years....
Update on the Beebone Botnet Takedown
On April 8, the takedown operation for the polymorphic botnet known as Beebone successfully concluded. This action redirected traffic from...
Takedown Stops Polymorphic Botnet
Several global law enforcement agencies—with assistance from McAfee —this week successfully dismantled the “Beebone” botnet behind a polymorphic worm known...
Here’s What You Need To Know About Botnets
In the year of 2000, Professor Vijay Pande, a renowned Stanford University researcher, released a little program that, when downloaded...
What is a Remote Administration Tool (RAT)?
Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I...