What’s Your Click IQ?
The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be to have your...
Top 3 Phishing Attacks Use Similar Tricks
Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing...
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often...
Necurs, Zbot Use Obfuscated Windows XP Detection to Bypass Analysis
This blog was written by Sanchit Karve. McAfee Labs has recently come across a number of malware samples that drop...
Product Coverage and Mitigation for CVE-2014-1776 (Microsoft Internet Explorer)
On April 26, Microsoft released Security Advisory 2963983 for Microsoft Internet Explorer. In-the-wild exploitation of this vulnerability has been observed...
You’ve Got Mail — But it Might be a ‘Spoof’
As Internet users everywhere are on heightened alert following the discovery of the password-compromising Heartbleed bug earlier this month, it...
Google Docs Phishing Campaign is Frighteningly Accurate
Gmail users beware: a very convincing, very deceitful, phishing scam has been making its way around the Internet. The scam...
Internet Explorer Zero Day Offers Unusual Case Study
While analyzing a recent Internet Explorer zero-day vulnerability, CVE-2014-0322 (containing the Flash sample hash b9c9dab0fd30418884800afebbaba4d99f4526ef0c9a47972a20ab20fed0a06d), we noticed the exploit makes...
Apple, SSL, and the Importance of Updating Your Software
Before we begin: please take a minute to update all of your iOS devices to the latest iOS version, iOS...
How to Secure Your Yahoo! Mail Account
Last week, Yahoo! announced on their blog that the email accounts for an unspecified number of users had been compromised...