Featured Blogs
Botnet Control Servers Span the Globe
McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet. With millions of McAfee endpoints...
The Future of Hacktivism and Anonymous
After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of...
Java Zero-Day Vulnerability Pushes Out Crimeware
This blog was updated on January 14. See the end of the file. A new Java zero-day vulnerability is spreading...
The 3 R’s: Riches, Ruins & Regulations
We previously wrote about what it means to be a security-obligated executive – how to identify threat warning signs and...
Red Kit an Emerging Exploit Pack
Exploit kits are toolkits that are used to build malware components such as binaries and scripts. They automate the exploitation...
If You Deploy Only Antivirus, It Will Cost You More and Make You Less Secure
Everyone’s looking to shave their IT budgets, manage fewer vendors and streamline. The plethora of low cost and sometimes free...
YouTube Video Scam Targets Facebook Users
Be advised cybercriminals are at it again, leveraging the popularity of Facebook and YouTube to scam consumers.We have seen several...
New Labs Report: ‘Analyzing Project Blitzkrieg’
Project Blitzkrieg, a current attack on US financial institutions, got a lot of media attention following a blog posting by...
Narilam Trojan Targets Iranian Financial Software
Iranian infrastructure has been on the radar of cyberattackers for a couple of years. We have already witnessed organized and...
The Connected Home – Introducing Little Red Boxes…
This will be old news to those of you who took the time to visit McAfee Focus 2012 , but for...