2014 Threats Predictions: Cybercrime and Hacktivism Will Continue to Grow
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions....
Analyzing the Recent Windows Zero-Day Escalation of Privilege Exploit
Recently we caught a malicious sample that exploits a PDF vulnerability–CVE-2013-3346, we believe–and executes after a use-after-free condition occurs. During...
5 Cyber Safety Lifehacks for Families (5 Minutes or Less)
Raising a child to be a digitally discerning adult—while trying to slay our own online dragons—seems to take more hours...
Quarian Group Targets Victims With Spearphishing Attacks
This blog post was written by Rahul Mohandas. The current generation of targeted attacks are getting more sophisticated and evasive....
Ramnit Malware Creates FTP Network From Victims’ Computers
This blog post was written by Vikas Taneja. The Ramnit worm appeared in 2010. Within a year more than eight...
Android App Contains Windows Worm
When developers are unaware of security they open the door to threats against their customers and users. We are not...
New Zero-Day Attack Copies Earlier Flash Exploitation
Late on July 10, Microsoft released a blog post disclosing that they were aware of a zero-day attack in the...
Six Easy Steps to Help Keep Hackers at Bay
Cybercriminals are adopting complex and powerful techniques to “hack,” or take control of online accounts belonging to other people or...
Phishing Attack Replaces Android Banking Apps With Malware
Mobile devices are also increasingly being used to manage a critical and important asset for all of us: our money....
Emerging ‘Stack Pivoting’ Exploits Bypass Common Security
[This blog was primarily written by Xiaoning Li of McAfee Labs, with assistance from Peter Szor of McAfee Labs.] In...