Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

Analyzing the First ROP-Only, Sandbox-Escaping PDF Exploit

The winter of 2013 seems to be “zero-day” season. Right after my colleague Haifei Li analyzed the powerful Flash zero...

McAfee Labs

Fake Cleaning Apps in Google Play: an AutoRun Attack and More

Almost exactly one year ago, Google announced the addition of a “new layer to Android security,” a service codenamed Bouncer...

McAfee Labs

Evasion Techniques: Encoded JavaScript Attacks PDF Files

Last week I kicked off a series of blogs with a discussion of how an effective IPS solution can fight...

McAfee Labs

Labs Paper Looks ‘Inside the World of the Citadel Trojan’

Zeus “banking” malware and its variants have been making headlines in recent months. One variant, the Citadel Trojan, has now...

McAfee Labs

IPS Countermeasures Fight Obfuscation, Evasion

Before the advent of intrusion detection systems (IDS) and intrusion prevention systems (IPS), firewalls served as the primary technology to...

McAfee Labs

Botnet Control Servers Span the Globe

McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet.  With millions of McAfee endpoints...

McAfee Labs

The Future of Hacktivism and Anonymous

After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of...

McAfee Labs

Java Zero-Day Vulnerability Pushes Out Crimeware

This blog was updated on January 14. See the end of the file. A new Java zero-day vulnerability is spreading...

McAfee Labs

Red Kit an Emerging Exploit Pack

Exploit kits are toolkits that are used to build malware components such as binaries and scripts. They automate the exploitation...

McAfee Labs

If You Deploy Only Antivirus, It Will Cost You More and Make You Less Secure

Everyone’s looking to shave their IT budgets, manage fewer vendors and streamline. The plethora of low cost and sometimes free...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top