McAfee Labs

The Day of the Golden Jackal – The Next Tale in the Stuxnet Files: Duqu Updated

Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the near future. One thing for sure is that the Stuxnet team is still active–as recent evidence has revealed. McAfee Labs received a kit from an independent team of researchers that ...

McAfee Labs

No Winners at QR Code Roulette

Last year a friend had a bright idea for a party game that involved a series of QR codes in a circle on paper. He called it QR Code Roulette. Unlike the gambling game, selecting the right 2D barcode did not make you a winner. It turned out that every ...

McAfee Labs

Rooting Exploit for Android Works Silently

In our last blog about Android malware, we discussed the expanding threat landscape for Android malware. Recently, we received an Android package in our collection and observed that this malicious application uses a rooting exploit that targets Android devices running OS Versions 2.3 or earlier to gain root privileges on ...

McAfee Labs

Spitmo vs Zitmo: Banking Trojans Target Android

SpyEye and Zeus are probably the most prevalent and active Trojan “banker” families seen in the wild. (Bankers steal bank passwords and other financial data.) At the beginning of the year there was a rumor about the “merger” of both toolkits into a new generation of banking Trojan. It is not ...

Family Safety Identity Protection

15 Social Media Security Tips

1. Realize that you can become a victim at any time. Not a day goes by when we don’t hear about a new hack. With 55,000 new pieces of malware a day, security never sleeps. 2. Think before you post. Status updates, photos, and comments can reveal more about you ...

McAfee Labs

Dissecting Zeus for Android (or Is It Just SMS Spyware?)

Zeus, also known as ZBot, is one of best-known malware in the industry. The main purpose of this malware is to steal banking credentials, allowing attackers to commit electronic fraud. Until 2010, Zeus existed only for personal computers since this platform was (and still is) the principal medium for electronic ...

Enterprise

June #SecChat Recap: Stealth Crimeware

Last week, we hosted our monthly #SecChat on Stealth Crimeware. When it comes to building malware, cyber criminals are getting smarter – employing stealth techniques with malware able to self-replicate and evade detection for long periods of time. It can be costly for enterprises to remediate the damage done to ...

Enterprise

Hackers vs. Hackers: The New Frontier Of Embedded Devices

If we look at the evolution of hacking, certain techniques never go out of style, but we’re at the beginning of a big shift in terms of the targets.  The threat landscape has evolved beyond PCs, tablets, and smartphones to a whole new battleground: connected devices all around us. According ...

Family Safety Identity Protection

Most Unwanted Criminals: Phishers, Shoulder Surfers and Keyloggers

McAfee’s most unwanted criminals have included pickpockets, Trojan viruses, and ATM skimmers, dumpster divers, spies, and wireless hackers and now phishers, shoulder surfers, and keyloggers. Identity theft can happen online or on the ground to anyone with a pulse, and even to the deceased. The key is awareness, vigilance, and ...

McAfee Labs

Mac ‘Protector’: Another Fake-Alert in Disguise

It’s not breaking news that fake-alert Trojans infections are growing. But it’s worrying for Mac OS X users to find themselves a target for those attacks. As my colleague Tad Heppner mentioned in his post, a scareware called MacDefender was spotted in the wild. Mac users can be fooled by ...

Subscribe to McAfee Securing Tomorrow Blogs