Featured Blogs
15 Minutes with… David O’Berry
Welcome to “15 minutes with” – an occasional contribution between myself and the movers-and-shakers within McAfee’s technical community. This week...
Rooting Exploit for Android Works Silently
In our last blog about Android malware, we discussed the expanding threat landscape for Android malware. Recently, we received an...
Spitmo vs Zitmo: Banking Trojans Target Android
SpyEye and Zeus are probably the most prevalent and active Trojan “banker” families seen in the wild. (Bankers steal bank...
Why Does My Car Have Its Own Smartphone?
You would be surprised at the number of places you can find a GSM SIM card. Outside of your mobile phone,...
Dissecting Zeus for Android (or Is It Just SMS Spyware?)
Zeus, also known as ZBot, is one of best-known malware in the industry. The main purpose of this malware is...
Responses to Cybercrime in Japan and France
This week the Sorbonne University and the French Department of Justice hosted a meeting, the World and Development Institute (IMODEV) International...
Mobile Device, Or Not? That Is The Question
For the last couple of weeks I’ve been presenting around the U.S. at events such as Secure360 in St. Paul,...
Mac ‘Protector’: Another Fake-Alert in Disguise
It’s not breaking news that fake-alert Trojans infections are growing. But it’s worrying for Mac OS X users to find...
Fake-Alert Scams Growing Again
Fake-alert Trojans, also known as scareware, fool consumers by claiming imaginary threats, and insisting its victims purchase a product to...
I Smell a RAT: Java Botnet Found in the Wild
Most of today’s malware works on Windows and its apps, because it can affect a lot of people around the...