2014 Threats Predictions: Network and Host Attacks Will Again Target Apps, Java
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions....
‘Pony’ Botnet Gallops Off With 2 Million Passwords
In what appears to be a worldwide attack, cybercriminals have successfully stolen 2 million account passwords with a botnet known...
Cracking Passwords is as Easy as “123”
One month after announcing a corporate data raid affecting 2.9 million of their users, Adobe has found the extent of...
Quarian Group Targets Victims With Spearphishing Attacks
This blog post was written by Rahul Mohandas. The current generation of targeted attacks are getting more sophisticated and evasive....
Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code
Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware...
Malware Manipulates Procedure Prologue and Epilogue to Evade Security
Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers,...
Phishing Scam Targets Walmart.com Online Customers
Late last week, Walmart alerted the public to an email-based scam that used the company’s name (misspelled as “Wallmart”) to...
Emerging ‘Stack Pivoting’ Exploits Bypass Common Security
[This blog was primarily written by Xiaoning Li of McAfee Labs, with assistance from Peter Szor of McAfee Labs.] In...
Tracking PDF Usage Poses a Security Problem
Update on May 2 Adobe has confirmed this vulnerability and has scheduled a patch release for May 14. Looking...
Are Google and Bing Serving You Safe Search Results?
New research has concluded that despite best efforts to keep search results clean, Google and Bing often serve malware-infected sites...