Governments globally need to focus on the unintended consequences of across the board attempts to deal with deficit spending. Saving pennies is important, but we need to make certain those savings do...
Earlier this week, a new vulnerability was discovered, potentially afflicting up to 950 million Android devices. This accounts for nearly all of active Android users. And what’s more shocking, it all...
While the latest news on the federal government’s cybersecurity posture zeroes in on data breaches, protecting the critical infrastructure that government and the private sector rely on is an equally...
Latest Viruses & Latest Malware Trends
Get cutting-edge security as it happens. Read our experts’ tips and techniques to help you avoid and defeat the latest malware trends, and view portions of their actual research to stay even more informed.
Limiter et protéger votre entreprise contre les attaques de type Dridex peut se faire à différents niveaux d’interception : Fichiers, Registre, URL et IP, et celà à travers plusieurs technologies des gammes de produits Intel Security. La protection contre ce type de codes malveillants extrêment volatile nécessite une approche multi niveaux et une coordination entre les différents […]
For several weeks after we released the McAfee Labs Threats Report, May 2015, in which we discussed the topic of ransomware in depth, we frequently saw the same questions: “Why is ransomware increasing, and why is it so successful? In our report we offered a few answers to this question. We’d like to zoom in […]
It’s likely to be the first question you get after telling your kids to turn off their phones (for the zillionth time) this summer. If you haven’t gotten it yet, just wait. Wait. A little longer . . . okay . . . and there it is! “What am I supposed to do?!” That’s your […]
This post was written by Haifei Li of Intel Security and Xiaoning Li of Intel Labs. Microsoft Office documents play an important role in our work and personal lives. In the last couple years, unfortunately, we have seen a number of exploits, especially some critical zero-day attacks, delivered as Office documents. Here are a couple […]
Got a great business idea? Want to expand with less risk? Build a good product, develop some training, put them together into a repeatable formula, and collect the royalties from your franchisees. This model, used successfully for everything from fast food to hair salons to tax preparation, is now available for criminal ransomware. Cybercriminals have […]