For me, perhaps the biggest highlight from VMworld last week was the announcement of our new capabilities for the Server Security Suites – a project that my team has been ingrained in for a while now,...
At the AVAR conference in November, with the help of coauthor and independent security researcher Song Li, we will present our findings of an emerging mobile threat vector.
We have found that in a group...
So far, 2014 has been a tumultuous year for the security industry. We’ve seen thousands of computers taken hostage through ransomware—malicious software that encrypts and locks data until the victim...
Get cutting-edge security as it happens. Read our experts’ tips and techniques to help you avoid and defeat the latest malware trends, and view portions of their actual research to stay even more informed.
Last year, we blogged about the actor known as Quarian, who is involved in targeted attacks. This individual or group has been active since at least 2011 and has targeted government agencies. The attacks use spear phishing campaigns with crafted .pdf and .doc files as bait for unsuspecting users. Recently, we found a new sample […]
Often we see malware authors using encryption or obfuscation along with other techniques to modify the static contents of malware. They do this to evade static-based clustering and detection even though the behavior is the same. In many cases obfuscation also helps hide the threat’s malicious intentions from security researchers. BackOff, a point-of-sale malware designed […]
At the AVAR conference in November, with the help of coauthor and independent security researcher Song Li, we will present our findings of an emerging mobile threat vector. We have found that in a group of popular retail apps, such as Costco’s and Walgreens’ apps for Android, when a QR code is scanned using the […]
In March, we wrote about changes that we were making to the McAfee Labs Threats Reports. Those changes included both format and content improvements. We wanted to make the Threats Reports more engaging, easier to understand, and simpler to navigate. It’s now August, we’ve published three threats reports in the new format, and we’re interested […]
During the past few days, the media has been abuzz with the massive celebrity photo leak nicknamed CelebGate 2014. The story started on August 31 when the first nude pictures appeared on a 4chan board. An alarming list of victims has been posted. Fake or true, today almost 450 pictures and videos are circulating on 4chan, […]