First Target and Neiman Marcus, now Sally Beauty. This seems an appropriate time to address not only how to recover from a security breach – but more importantly how to prevent future attacks and regain...
Things have kicked off with a force at Mobile World Congress 2014 in beautiful Barcelona, Spain, where several industries focusing on mobile technologies will come together to share the latest digital and social innovations.
Some would say that if encryption isn’t becoming ubiquitous, then it should be! Data breaches are in the news nearly every day now. Last week it was reported that in 2013, payment card data breaches...
Get cutting-edge security as it happens. Read our experts’ tips and techniques to help you avoid and defeat the latest malware trends, and view portions of their actual research to stay even more informed.
The buzz about Bitcoin has moved from online circles to mainstream media sources. Last week’s news of the collapse of exchange Mt. Gox got more play than in just the business section. Everyone seems to be interested in the digital, anonymous, and stateless currency. Governments have made pronouncements, law enforcement has investigated its use in […]
Starting with the McAfee Labs Threats Report: Fourth Quarter 2013 posted today, we’re taking a fresh approach to its format, content, and supporting materials. We had several things in mind when developing this new approach: Focusing on a few key topics and trends. Those topics will cover top threats or security issues from the quarter; […]
From McAfee’s first Cyber Defense Center (CDC) in Dubai, we closely monitor threats and activities in Europe and the Middle East. Since the Center’s official launch in September 2013, we have seen quite a few interesting trends, especially in the Persian Gulf region. Many of the activities spotted are related to hacktivism, cybercrime, or regional […]
Android users usually download and install applications from the Google Play store through several interactions with the service–including viewing the app’s description and granting permission requests by the app. This confirmation procedure helps us avoid installing malicious and potentially unwanted apps. However, McAfee recently found a suspicious app on Google Play that almost automatically downloads, […]
While analyzing a recent Internet Explorer zero-day vulnerability, CVE-2014-0322 (containing the Flash sample hash b9c9dab0fd30418884800afebbaba4d99f4526ef0c9a47972a20ab20fed0a06d), we noticed the exploit makes an unorthodox call to ZwProtectVirtualMemory to bypass data execution prevention. What is different about this call? The argument(s) of ZwProtectVirtualMemory are placed in an unusual manner. Typically arguments that are pointer variables belonging to the […]