Featured Blogs
Travnet Botnet Controls Victims With Remote Admin Tool
The malicious binary behind the Travnet botnet has been updated. The new code has a new compression algorithm, steals the...
Are you Hackable or Uncrackable? “Password Day” is Today!
Yes, such a day exists and it’s today, May 7th 2013. McAfee is working to make sure consumers increase their...
Emerging ‘Stack Pivoting’ Exploits Bypass Common Security
[This blog was primarily written by Xiaoning Li of McAfee Labs, with assistance from Peter Szor of McAfee Labs.] In...
Cybercasing – How Sharing Your Pics, Videos and Status Updates Can Get You Into Trouble
It can be fun ‘checking in’ at your favourite restaurant on Facebook, sharing pics of your hotel room on Instagram...
Visualizing A DDoS Cyber Attack
A denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated...
Tracking PDF Usage Poses a Security Problem
Update on May 2 Adobe has confirmed this vulnerability and has scheduled a patch release for May 14. Looking...
Are Google and Bing Serving You Safe Search Results?
New research has concluded that despite best efforts to keep search results clean, Google and Bing often serve malware-infected sites...
Travnet Botnet Steals Huge Amount of Sensitive Data
In a McAfee Labs blog by my colleague Vikas Taneja last month, he discussed high-level functioning in the malware Travnet....
Don’t Want to Read Through the Fine Print? There’s an App for That
We’ve always been told to “read the fine print before you sign on the dotted line,” but let’s be frank....
Digital Stalking: Physical Eavesdropping on Your Mobile Device
Did you know that while you innocently play games or browse Facebook on your smartphone or tablet, someone might be...