First Target and Neiman Marcus, now Sally Beauty. This seems an appropriate time to address not only how to recover from a security breach – but more importantly how to prevent future attacks and regain...
Things have kicked off with a force at Mobile World Congress 2014 in beautiful Barcelona, Spain, where several industries focusing on mobile technologies will come together to share the latest digital and social innovations.
Get cutting-edge security as it happens. Read our experts’ tips and techniques to help you avoid and defeat the latest malware trends, and view portions of their actual research to stay even more informed.
Starting with the McAfee Labs Threats Report: Fourth Quarter 2013 posted today, we’re taking a fresh approach to its format, content, and supporting materials. We had several things in mind when developing this new approach: Focusing on a few key topics and trends. Those topics will cover top threats or security issues from the quarter; […]
From McAfee’s first Cyber Defense Center (CDC) in Dubai, we closely monitor threats and activities in Europe and the Middle East. Since the Center’s official launch in September 2013, we have seen quite a few interesting trends, especially in the Persian Gulf region. Many of the activities spotted are related to hacktivism, cybercrime, or regional […]
Android users usually download and install applications from the Google Play store through several interactions with the service–including viewing the app’s description and granting permission requests by the app. This confirmation procedure helps us avoid installing malicious and potentially unwanted apps. However, McAfee recently found a suspicious app on Google Play that almost automatically downloads, […]
While analyzing a recent Internet Explorer zero-day vulnerability, CVE-2014-0322 (containing the Flash sample hash b9c9dab0fd30418884800afebbaba4d99f4526ef0c9a47972a20ab20fed0a06d), we noticed the exploit makes an unorthodox call to ZwProtectVirtualMemory to bypass data execution prevention. What is different about this call? The argument(s) of ZwProtectVirtualMemory are placed in an unusual manner. Typically arguments that are pointer variables belonging to the […]
On February 19, Microsoft released Security Advisory (2934088) for Microsoft Internet Explorer. This vulnerability was previously reported, by 3rd parties, during the 2nd week of February 2014. In-the-wild exploitation has been observed (at least) back to early January 2014. Specifically, the flaw is a use-after-free condition during Internet Explorer’s processing of specific CMarkup objects. We […]