Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

Evasion Techniques: Encoded JavaScript Attacks PDF Files

Last week I kicked off a series of blogs with a discussion of how an effective IPS solution can fight...

McAfee Labs

Labs Paper Looks ‘Inside the World of the Citadel Trojan’

Zeus “banking” malware and its variants have been making headlines in recent months. One variant, the Citadel Trojan, has now...

McAfee Labs

IPS Countermeasures Fight Obfuscation, Evasion

Before the advent of intrusion detection systems (IDS) and intrusion prevention systems (IPS), firewalls served as the primary technology to...

McAfee Labs

Botnet Control Servers Span the Globe

McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet.  With millions of McAfee endpoints...

McAfee Labs

The Future of Hacktivism and Anonymous

After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of...

McAfee Labs

Java Zero-Day Vulnerability Pushes Out Crimeware

This blog was updated on January 14. See the end of the file. A new Java zero-day vulnerability is spreading...

Executive Perspectives

The 3 R’s: Riches, Ruins & Regulations

We previously wrote about what it means to be a security-obligated executive – how to identify threat warning signs and...

McAfee Labs

Red Kit an Emerging Exploit Pack

Exploit kits are toolkits that are used to build malware components such as binaries and scripts. They automate the exploitation...

McAfee Labs

If You Deploy Only Antivirus, It Will Cost You More and Make You Less Secure

Everyone’s looking to shave their IT budgets, manage fewer vendors and streamline. The plethora of low cost and sometimes free...

McAfee Labs

YouTube Video Scam Targets Facebook Users

Be advised cybercriminals are at it again, leveraging the popularity of Facebook and YouTube to scam consumers.We have seen several...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top