Featured Blogs
Xirtem Worm Hides in CAB/SFX Files
W32/Xirtem@@MM is a fast-spreading and active worm, discovered in late 2008, that uses a variety of methods to propagate. The...
Mobile NFC Features Raise Security Concerns
Yesterday, at the Web 2.0 Summit, Google’s CEO Eric Schmidt presented the Nexus S. This wasn’t just about a new...
Missing Hotel Room Key? Try Your Phone
If you are like me, there are times when you will misplace your hotel key. Times when you’re switching a...
The Riskiest Web Domains Revealed – Mapping The Malweb
The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to our fourth annual Mapping the Mal...
Stuxnet Update
Stuxnet has received a lot of attention since McAfee first blogged about it in July. This post will answer some of...
McAf.ee – Create Secure Short URLs…
A pet project of mine for a couple of months now, McAfee’s secure-short URL service http://mcaf.ee went through a viral...
Zeus Crimeware Toolkit
The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This...
McAfee Completes Acquisition of tenCube (by Dave DeWalt)
Yesterday, McAfee completed the acquisition of privately owned tenCube, the provider of the WaveSecure mobile security service. I’m excited to...
Remote iPhone Jailbreak Using PDF Exploit Should Serve as Wake-Up Call
Like many iPhone users, I “jailbreak” my iPhone. I do this for many reasons, but mainly for console-level access and...
Remote Jackpot: Hacking ATMs
Isn’t it just everybody’s dream: to walk up to an ATM, swipe your card, get a flashy screen reading “We...