Digging Into the Sandbox-Escape Technique of the Recent PDF Exploit
As promised in our previous blog entry for the recent Adobe Reader PDF zero-day attack, we now offer more technical...
The Future of Hacktivism and Anonymous
After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of...
W32/Autorun Worm: A Nasty Bug for Your Computer
What do you think of when you hear the word “malware”? Most people think of the general term “virus”–something that...
Hackers Gone Hipster: Are Tumblr and Instagram Users Still at Risk?
Two newsworthy vulnerabilities hit the stands this week, both of particular interest to many of our at-home users. Monday morning,...
10 Tips to Safe Online Shopping
How times have changed. I can remember when Christmas didn’t start until after Thanksgiving—not before Halloween as we see things...
Actress Sofia Vergara’s Personal Photos Hacked or Stolen Via Mobile
In my line of work I get emails such as this one: “Hi Robert, I’m not sure if you saw...
A Quick Analysis of the Flash Player Opcode-Verifying Code Execution Vulnerability
On October 12, McAfee Labs learned of proof-of-concept code exploiting a newly patched Flash Player vulnerability. Adobe had patched this...
Malicious Websites – The Web is a Dangerous Place
McAfee’s latest Threats Report shows a growth in malicious websites replacing botnets as the primary infection mechanism. This means that...
No Surprise – Ransomware On the Rise
McAfee’s latest Threats Report shows a 1.5 million increase in malware since last quarter. 2012 is in fact, far and...
Yahoo! Hacked: 15 Tips To Better Password Security
In light of the Yahoo Voices hack where 450,000 passwords have been compromised, it’s time again to let the world...