There are rules and then there are rules for kids. A set of rules for school, another defined set at games, and a complete set of unwritten rules at home. But there is one field that our kids traverse almost daily, spending hours there at their own free will, mostly unsupervised—the cyber world. Yet few […]

In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at the kernel level to bypass Microsoft’s security for 64-bit Windows systems. Today a small utility program named KPP-Destroyer can be found online. Previous versions of KPP-Destroyer had some bugs on a Windows 8.1 computer, but […]

Wouldn’t it be convenient if the dangers heading toward our kids had neon signs pointing to them? Unfortunately, that’s not the way things work and, more often than not, the dangers are camouflaged, sometimes intentionally. While it’s normal for kids to have secrets, when you add technology to the mix, there might be hidden dangers to […]

Recently, the McAfee Advanced Exploit Detection System (AEDS) has delivered some interesting RTF files to our table. These RTFs have executables “attached” to the documents. Usually, some words in the documents try to convince users to click and run the attachments. The following figure shows the point at which a user clicks on the attachment. […]

Hang ten, dude! It’s summertime and surfers are taking to the ocean to go catch some gnarly waves. Experienced surfers know that there are dangers out in the water and are trained to look out for them. These dangers include rip currents, shallow water, and of course, sharks. Just like there are dangers in the […]