Information Operations an Integral Part of Cyberwarfare
Weapons and the skills to use them are not the only decisive elements in warfare. Rhetoric and imagery are important,...
Strike a Pose: Blackshades Malware Spies Through Your Webcam
In the old days, one simply had to draw their blinds to avoid peeping toms from spying on their private...
Iranian Keylogger Marmoolak Enters via Backdoor
Targeted attacks have several stages, sometimes called the APT kill chain. At McAfee Labs we prefer the model described by...
Necurs, Zbot Use Obfuscated Windows XP Detection to Bypass Analysis
This blog was written by Sanchit Karve. McAfee Labs has recently come across a number of malware samples that drop...
Targeted Attacks, Stolen Certificates, and the Shiqiang Gang
This blog post was written by Rahul Mohandas. The trend of attackers using stolen digital certificates to disguise their malicious...
Product Coverage and Mitigation for CVE-2014-1776 (Microsoft Internet Explorer)
On April 26, Microsoft released Security Advisory 2963983 for Microsoft Internet Explorer. In-the-wild exploitation of this vulnerability has been observed...
Changing Passwords in a Post Heartbleed Bug World
From a home security standpoint, the main gatekeeper is the house key. It’s small, portable and fairly adept at keeping...
Zbot Botnet Steals Thousands of Credentials
In McAfee Labs we keep a close eye on the Zeus/Zbot/Gamover botnet malware that is responsible of thousands of samples...
RTF Zero-Day Attack CVE-2014-1761 Shows Sophistication of Attackers
A serious RTF zero-day attack has struck recently. McAfee detection solutions were provided a couple of days ago that allowed...
RTF Attack Takes Advantage of Multiple Exploits
This is a joint analysis by Haifei Li, Stanley Zhu, and Jun Xie of McAfee Labs Recently, the rich text...