Emerging ‘Stack Pivoting’ Exploits Bypass Common Security
[This blog was primarily written by Xiaoning Li of McAfee Labs, with assistance from Peter Szor of McAfee Labs.] In...
Cybercasing – How Sharing Your Pics, Videos and Status Updates Can Get You Into Trouble
It can be fun ‘checking in’ at your favourite restaurant on Facebook, sharing pics of your hotel room on Instagram...
Visualizing A DDoS Cyber Attack
A denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated...
Tracking PDF Usage Poses a Security Problem
Update on May 2 Adobe has confirmed this vulnerability and has scheduled a patch release for May 14. Looking...
Fake Vertu App Infects Korean and Japanese Android Users
A new threat has surfaced targeting users in Korea and Japan, but this attack, unlike others making the news, is...
Multiple Java Exploits Hide in a Jar (File)
Exploits of the Java Runtime Environment (JRE) have been extensively used in drive-by-download toolkits such as Blackhole and Red Kit....
VSkimmer Botnet Targets Credit Card Payment Terminals
April 2 This blog has been updated with McAfee’s NSP detection. See end of blog. While monitoring a Russian underground...
Tax Season Email Scam Aims to Steal from Uncle Sam
Every year around tax season, we see a huge spike in tax-related social engineering attacks. Social engineering is a type...
Travnet Trojan Could Be Part of APT Campaign
This blog post was written by Vikas Taneja. Attackers use all kinds of attack vectors to steal sensitive information from...
An Overview of Messaging Botnets
In the quarterly McAfee Threats Reports we offer our readers some charts on the prevalence of messaging botnets. For the...