Trust Is the Most Valuable Asset
The most valuable asset for actors in cyberspace is trust. It is an important ingredient in successful business operations as...
Trailing the Trojan njRAT
One Trojan that just won’t go away is the remote access tool njRAT. Microsoft recently took down a leading domain...
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often...
The Internet of Things Needs a Standard. There’s a Consortium for That
Let’s talk about networks. A network can imply a number of things: it can imply a group of friends, coworkers...
GameOver Zeus/Cryptolocker: Am I Still Infected?
It has been two weeks since the announcement by multiple global law enforcement agencies regarding the takedown of the communications...
Stay Connected Safely When Using Free Wi-Fi in Public Areas
I am just back from my summer hols, and feeling absolutely refreshed! Holidays are so necessary to recharge you and...
Information Operations an Integral Part of Cyberwarfare
Weapons and the skills to use them are not the only decisive elements in warfare. Rhetoric and imagery are important,...
Necurs, Zbot Use Obfuscated Windows XP Detection to Bypass Analysis
This blog was written by Sanchit Karve. McAfee Labs has recently come across a number of malware samples that drop...
Product Coverage and Mitigation for CVE-2014-1776 (Microsoft Internet Explorer)
On April 26, Microsoft released Security Advisory 2963983 for Microsoft Internet Explorer. In-the-wild exploitation of this vulnerability has been observed...
Chameleon: the Wi-Fi Virus That Hides in Plain Sight & Spreads Like a Cold
Recently, a group of researchers at the University of Liverpool successfully tested a new virus with a terrifying potential. It...