Featured Blogs
Trailing the Trojan njRAT
One Trojan that just won’t go away is the remote access tool njRAT. Microsoft recently took down a leading domain...
Chinese Worm Infects Thousands of Android Phones
Last weekend, it was reported in China that an SMS worm was wildly spreading among Android mobile phones, with more...
Android App SandroRAT Targets Polish Banking Users via Phishing Email
Europe is currently under attack by spammers trying to get control of Android devices. In Germany the distribution method is...
‘DHL’ SMS Spam Distributes Android Malware in Germany
One of the most common methods for distributing PC malware is the use of email spam messages that pose as...
The Golden Rule Of The Internet- Tips To Help You Train Your Kids To Become Good Netizens
There are rules and then there are rules for kids. A set of rules for school, another defined set at...
Malicious Utility Can Defeat Windows PatchGuard
In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at...
Are Your Kids Using Decoy Apps to Hide Photos, Videos?
Wouldn’t it be convenient if the dangers heading toward our kids had neon signs pointing to them? Unfortunately, that’s not the...
Dropping Files Into Temp Folder Raises Security Concerns
Recently, the McAfee Advanced Exploit Detection System (AEDS) has delivered some interesting RTF files to our table. These RTFs have...
More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked
In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else. Everyone else is...
Results- vs. Device-Centric Threats: Why Cyber-Attacks Should be in the WMD Conversation
This week we’re heading to Colorado for the Aspen Institute’s annual Aspen Security Forum. I’ll be speaking on a Friday...