Intel Security

All Security Awareness Reports and Resources

McAfee Labs Threats Report: December 2016

McAfee Labs researchers analyze results from a primary research study on security operations centers (SOCs), summarize “the year of ransomware,” and explore how adversaries use Trojans to infect legitimate software.

McAfee Labs 2017 Threats Predictions

Our researchers offer long-lens predictions about cloud and internet of things (IoT) threats, laws, and vendor responses. They also make specific predictions about threats activity in 2017, including ransomware, vulnerabilities of all kinds, and the use of threat intelligence to improve defenses.

Health Warning: Cyberattacks are Targeting the Health Care Industry

Our researchers investigate the theft of and marketplace for stolen personal health information and biopharmaceutical intellectual property.

McAfee Labs Threats Report: September 2016

McAfee Labs researchers analyze survey data to gain a deeper understanding of data theft, investigate Q1/Q2 ransomware attacks on hospitals, and discuss the practical application of machine learning in cybersecurity.

2016 Data Protection Benchmark Study: Visibility and Maturity of a Data Loss Prevention Program

The Ponemon Institute conducted a seven-nation survey of 1,000 IT decision makers in financial services, healthcare, government, manufacturing, and retail organizations, to develop benchmarks for data loss prevention incidents, visibility, and maturity.

Threat Intelligence Sharing

Learn more about threat intelligence sharing and Intel Security’s leadership in driving its development.

WildFire Ransomware Takedown

Intel Security collaborates with industry and law enforcement to take down the command and control servers operating the WildFire ransomware.

The Need for Automotive Security

Successful attacks on automotive computer systems are becoming a reality, highlighting the increased threats to next-generation cars and motor vehicles. Get recommendations and best practices for securing the next-era vehicle.

Hacking the Skills Shortage

This report examines multiple aspects of the international shortage in cybersecurity skills and provides recommendations for addressing the workforce deficit.

Shade Ransomware Takedown

Intel Security collaborates with industry and law enforcement to take down the command and control servers operating the Shade ransomware.

McAfee Labs Threats Report: June 2016

McAfee Labs researchers investigate mobile app collusion, explain the current state of cryptographic algorithms, and provide an in-depth look at the Pinkslipbot Trojan.

Verizon 2016 Data Breach Investigations Report

Intel Security contributed to Verizon’s 2016 Data Breach Investigations Report, which provides a comprehensive analysis of data breach patterns seen in 2015.

Ransomware

Learn more about the growth of ransomware, how ransomware works, and how to protect against these attacks.

McAfee Labs Threats Report: March 2016

McAfee Labs researchers present results from primary market research around cyberthreat intelligence sharing and examine Adwind, a form of Java-based malware, which has grown in prevalence over the past year.

McAfee Labs Threats Report: November 2015

The McAfee Labs Threats Report: November 2015 details a new breed of file-less malware, poor coding practices that lead to vulnerabilities, and the return of macro malware.

McAfee Labs 2016 Threats Predictions

This report includes two distinct views of the future: First, we look forward five years and predict how the cyber threat landscape will change and the security industry’s likely response. Then, we look tactically at 2016 and make specific predictions about expected threat activity.

Lucrative Ransomware Attacks: Analysis of the CryptoWall Version 3 Threat

This is the first published report using combined threat research and intelligence from the Cyber Threat Alliance founding and contributing members, including Intel Security. It provides organizations with valuable insights into the CryptoWall Version 3 lifecycle and current proliferation, as well as tools for prevention and mitigation.

The Hidden Data Economy

This report details a few of the many ways in which cyber thieves monetize the information they have stolen.

McAfee Labs Threats Report: August 2015

The August 2015 McAfee Labs Threats Report takes a five-year look back at the changes in cybersecurity, analyzes tactics used by attackers to steal data, and examines malware attacks on graphics processing units (GPUs).

McAfee Labs Threats Report: May 2015

For the first time ever, we explore attacks on firmware. We also highlight Adobe Flash exploits that target the growing number of vulnerabilities not patched by users and a surge in powerful new ransomware that encrypts files and holds them hostage until the ransom is paid.

Catch Me If You Can: Antics of a Polymorphic Botnet

See how Intel Security and a global law enforcement action took down a major botnet that infected over 100,000 systems globally.

Infographic: McAfee Labs Threats Report — February 2015

This infographic highlights the continuing impact — this time to mobile apps — from several dangerous SSL/TLS vulnerabilities that were exposed in 2014.

Infographic: McAfee Labs 2015 Threats Predictions

Learn about the top security threats of 2015 predicted by McAfee Labs researchers.

Infographic: McAfee Labs Threats Report — November 2014

The McAfee Labs Threats Report: November 2014 details the far-reaching BERserk vulnerability and explores the various forms of trust abuse.

Infographic: McAfee Labs Threats Report — August 2014

The McAfee Labs Threats Report: August 2014 details the Heartbleed aftermath, results of the McAfee Phishing Quiz, and the results from Operation Tovar.

Flappy Bird Clones Help Mobile Malware Rates Soar

A rise in the number of malicious Flappy Bird game clones has increased the risk of mobile device data theft.

Mobile Malware Continues to Thrive

As mobile malware attacks become increasingly advanced, users need to implement stronger and smarter security techniques.

Rise of the Rootkits

A rise in rootkit malware was witnessed during the first quarter of 2014 as hackers have developed advanced methods to penetrate security in 64-bit systems.

Virtual Currency Botnets Dig up Fool’s Gold

Botnet vendors are now selling tools that can be used for virtual currency mining.

Cybercrime Industry Enables Point-of-Service (POS) Attacks

The cybercrime ecosystem that sells packaged malware makes point-of-sale (POS) breaches against retailers easier than ever for cybercriminals.

Malicious Signed Binaries Crush Certificate Authority Reputation

A drastic increase of malicious signed binaries has led to a lack of faith in the long-trusted certificate authority (CA) protocol.

Mobile Malware — The Rise Continues

The amount of mobile malware continued to skyrocket in 2013, reaching totals never before seen by researchers. Learn what to be aware of to keep your mobile device and identity safe.

Cloud-Based Applications Open for Exploits

Enterprises are shifting their data to cloud-based applications for convenient, cost-effective storage, but cybercriminals are eagerly waiting to attack visible exploits that are not adequately secured.

Cybercriminals Thrive Via Virtual Currencies

The rise and popularity of virtual currencies has also given way to an increase of cybercrime on underground websites.

PC and Android Malware on the Rise

Android-based malware continues to rise as cybercriminals find new ways to evade security.

New Cybercrime Tool: Ransomware Kits

Ransomware kits, an emerging cybercrime tool, allow criminals without programming skills to extort payments by holding a system hostage. Ransomware attacks on Windows PCs and mobile devices are expected to continue to grow.

Now for Sale: Hacking-as-a-Service

Cybercriminals are developing online sales sites to provide more secure and anonymous transactions to their clients.

Three Mobile Threats Impacting Android Smartphones and Tablets

Malware shopping spree apps, NFC worms, and update-blocking malware will have a major impact on Android smartphones and tablets, and the overall mobile security landscape, in 2013.

What Are the Biggest Threats to Your Network Security?

Remote procedure call and browser attacks have overtaken Structured Query Language (SQL) injection attacks, and MySQL brute-force attacks are on the rise.

Technology Advances Introduce Vulnerabilities to Energy Grid

Connecting old technology to the Internet and relying on embedded systems without focusing on security issues has made the energy grid vulnerable to cyberattacks.

What is Stuxnet?

In 2010 Stuxnet, a worm designed to sabotage energy facilities, attacked Iran’s nuclear enrichment facility. Since then, variants of the malware have proliferated with significant implications to the energy infrastructure around the globe.

How Cybercriminals Target Social Media Accounts

Cybercriminals are targeting social media users’ accounts now more than ever.

Infographic: How Confident Are Online Consumers?

This infographic looks at consumer attitudes toward shopping online and outlines how a security breach or the lack of a visible security policy or indicator can change a consumer’s decision to do business on a website, directly impacting an online merchant’s sales conversions.

Five Ways to Mitigate a Big-Scale Attack

Malicious attacks — where the only goal is to cause as much damage as possible — are expected to grow in 2013. Here are five key tips for enterprises to help mitigate the impact of these attacks aimed at breaching database and network security.

How to Fight Spam Text Messages (SMS Spam)

You can fight mobile phone spam, also known as SMS spam, by reporting spam messages to your cell phone carrier, registering your cell phone number with the National Do Not Call Registry, and checking your phone bill for unwanted spam text messages.

How Ransomware Infects Computers

Rasomware is one of the fastest growing areas of cybercrime. It uses links in emails or social media websites, and pay-per-install and drive-by downloads methods to infect computers.