[breadcrumb]
Security News

‘Pony’ Botnet Gallops Off With 2 Million Passwords

In what appears to be a worldwide attack, cybercriminals have successfully stolen 2 million account passwords with a botnet known...

Internet Security Privacy & Identity Protection

Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing!

An Indian investigative portal Cobrapost, recently released a report on alleged online reputation smearing/management/campaigns designed to gain/destroy political capital for who ever was...

McAfee Labs

Vertexnet Botnet Hides Behind AutoIt

Recently we found some new malware samples using AutoIt to hide themselves. On further analysis we found that those sample...

McAfee Labs

Andromeda Botnet Hides Behind AutoIt

Last month, I posted a blog about an increase in the use of AutoIt scripts by malware authors to carry...

Internet Security Privacy & Identity Protection

Bitcoin Headlines Attract Malware Developers

Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate. In the second quarter of...

Mobile Security

Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors

Nothing in life is free, and that’s especially true when it comes to mobile apps. Thousands of free apps are...

McAfee Labs

Delving Deeply Into a Bitcoin Botnet

Bitcoin is a virtual decentralized currency that was created in 2009 by developer Satoshi Nakamoto, who described the currency in...

McAfee Labs

Bank Account Logins for Sale, Courtesy of Citadel Botnet

Financial theft is one of the most lucrative forms of cybercrime. Malware authors continue to deliver sophisticated tools and techniques...

McAfee Labs

Travnet Botnet Controls Victims With Remote Admin Tool

The malicious binary behind the Travnet botnet has been updated. The new code has a new compression algorithm, steals the...

Internet Security

Visualizing A DDoS Cyber Attack

A denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated...

Subscribe to McAfee Securing Tomorrow Blogs