Featured Blogs
Cracking Passwords is as Easy as “123”
One month after announcing a corporate data raid affecting 2.9 million of their users, Adobe has found the extent of...
Scrooge’s 12 Scams of the Holidays
They’re baaaack! Actually, they never left—Scrooge’s little trolls work hard all year, scheming and scamming to steal holiday presents—or at...
Solving the Mystery of the Office Zero-Day Exploit and DEP
On November 5 McAfee Labs blogged about a Microsoft Office zero-day attack that we spotted in the wild. In another...
Updates and Mitigation to Microsoft Office Zero-Day Threat (CVE-2013-3906)
On November 5, Microsoft posted Security Advisory 2896666. This vulnerability, discovered by Haifei Li of McAfee Labs, affects multiple versions of Microsoft...
McAfee Labs Detects Zero-Day Exploit Targeting Microsoft Office
Last Thursday morning (October 31), our Advanced Exploit Detection System (AEDS), which we discussed in an earlier post, detected a...
What is a Firewall?
Most of us may have heard the term, and know it’s related to security in some way, but do you...
Why Parents Should Care About SnapChat’s New ‘Stories’ Feature
SnapChat has literally reshaped the teen experience since its release two years ago. The app, which allows a user to...
Periodic Connections to Control Server Offer New Way to Detect Botnets
A number of recent botnets and advanced threats use HTTP as their primary communications channel with their control servers. McAfee...
Oversharing on Social Media Common Amongst 50+
Thanks to social media, societal norms have undergone a seismic shift in the past five years. What was once considered...
Mobile Authentication vs. Mobile Banking and Commerce, Part II
Mobile authentication grants access to online banking – but it’s not exactly mobile banking. The main difference is that mobile...