Improve Protection Against Cyberattacks Through Shared Threat Intelligence
This blog post was written by Rick Simon. At the RSA Conference 2016 in San Francisco, Chris Young, GM and...
DHS Accelerates Information Sharing Standards Effort; McAfee to Chair Working Group
This post first appeared at Policy@Intel on March 9. In an effort to accelerate cyber information sharing, and in response...
Best practices for preventing Dridex infections
Mitigating the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of...
Brazilian Banking Malware Hides in SQL Database
Spam is a plague that has given headaches to system administrators and users for years. A lot of spam tries...
Chinese Trojan Hooks Macs, iPhones
“Distrust and caution are the parents of security”–Benjamin Franklin A recent threat targeting Chinese users of Mac OS X and...
Dropping Files Into Temp Folder Raises Security Concerns
Recently, the McAfee Advanced Exploit Detection System (AEDS) has delivered some interesting RTF files to our table. These RTFs have...
Examining Your Very Own Sefnit Trojan
Most malware is created for economic purposes. To name just a few of our reports and blogs on this topic,...
Updates and Mitigation to Microsoft Office Zero-Day Threat (CVE-2013-3906)
On November 5, Microsoft posted Security Advisory 2896666. This vulnerability, discovered by Haifei Li of McAfee Labs, affects multiple versions of Microsoft...
Quarian Group Targets Victims With Spearphishing Attacks
This blog post was written by Rahul Mohandas. The current generation of targeted attacks are getting more sophisticated and evasive....
Jumping Into the Flames of Skywiper
There has been quite a bit of analysis and speculation about the Flamer/Skywiper threat. As we started to analyze this...
- 1
- 2