Information Operations an Integral Part of Cyberwarfare
Weapons and the skills to use them are not the only decisive elements in warfare. Rhetoric and imagery are important,...
Necurs, Zbot Use Obfuscated Windows XP Detection to Bypass Analysis
This blog was written by Sanchit Karve. McAfee Labs has recently come across a number of malware samples that drop...
Product Coverage and Mitigation for CVE-2014-1776 (Microsoft Internet Explorer)
On April 26, Microsoft released Security Advisory 2963983 for Microsoft Internet Explorer. In-the-wild exploitation of this vulnerability has been observed...
Chameleon: the Wi-Fi Virus That Hides in Plain Sight & Spreads Like a Cold
Recently, a group of researchers at the University of Liverpool successfully tested a new virus with a terrifying potential. It...
Careto Worldwide Malware Attack Unmasked
On Monday Kaspersky Labs announced the discovery of a large number of malware infections across large parts of the globe. Kaspersky...
Analyzing the Target Point-of-Sale Malware
January 21, 2014: As more information comes to light, surrounding these events, we continue to identify and analyze additional components...
2014 Threats Predictions: Network and Host Attacks Will Again Target Apps, Java
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions....
2014 Threats Predictions: Software Defined Networking And More
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions....
Quarian Group Targets Victims With Spearphishing Attacks
This blog post was written by Rahul Mohandas. The current generation of targeted attacks are getting more sophisticated and evasive....
Q&A: What is ‘Path’ and Is It Safe for My Child?
Q: I overheard my son telling his friend to message him on Path. What is Path and should I be...