For me, perhaps the biggest highlight from VMworld last week was the announcement of our new capabilities for the Server Security Suites – a project that my team has been ingrained in for a while now,...
At the AVAR conference in November, with the help of coauthor and independent security researcher Song Li, we will present our findings of an emerging mobile threat vector.
We have found that in a group...
So far, 2014 has been a tumultuous year for the security industry. We’ve seen thousands of computers taken hostage through ransomware—malicious software that encrypts and locks data until the victim...
Get cutting-edge security as it happens. Read our experts’ tips and techniques to help you avoid and defeat the latest malware trends, and view portions of their actual research to stay even more informed.
Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing scams that attempt to steal your web mail credentials. Web Mail Scam This scam starts with an email that appears to come from Administrator or Helpdesk and requests that you validate or update your account. […]
Last year, we blogged about the actor known as Quarian, who is involved in targeted attacks. This individual or group has been active since at least 2011 and has targeted government agencies. The attacks use spear phishing campaigns with crafted .pdf and .doc files as bait for unsuspecting users. Recently, we found a new sample […]
Often we see malware authors using encryption or obfuscation along with other techniques to modify the static contents of malware. They do this to evade static-based clustering and detection even though the behavior is the same. In many cases obfuscation also helps hide the threat’s malicious intentions from security researchers. BackOff, a point-of-sale malware designed […]
At the AVAR conference in November, with the help of coauthor and independent security researcher Song Li, we will present our findings of an emerging mobile threat vector. We have found that in a group of popular retail apps, such as Costco’s and Walgreens’ apps for Android, when a QR code is scanned using the […]
In March, we wrote about changes that we were making to the McAfee Labs Threats Reports. Those changes included both format and content improvements. We wanted to make the Threats Reports more engaging, easier to understand, and simpler to navigate. It’s now August, we’ve published three threats reports in the new format, and we’re interested […]