In Memory of Peter Szor
Nov. 20: Update with details of memorial service at the end of this post. Earlier this week the security industry lost one of the pioneers of antimalware research, with the untimely death of Peter...
View ArticleDigitally Signed Malware: What Can You Trust Now?
One of the most startling revelations in the McAfee Labs Threats Report, Third Quarter 2013 is that the observed instance of digitally signed malware increased nearly 50%, to more than 1.5 million new...
View ArticleJapanese Chat App for Android Steals Phone Numbers
There have been many reports today of Android malware that steals users’ sensitive information and threatens the privacy of smartphone users. McAfee has recently found suspicious chat applications for...
View ArticleJavaScript Apps on Google Play Steal Korean Phone Numbers
In a recent blog, McAfee Labs reported on suspicious JavaScript-based Android chat applications for Japanese users. These apps were found on Google Play, and steal users’ phone numbers. We have now...
View ArticleMore Japanese Chat Apps on Google Play Steal Phone Numbers
In two recent blogs, McAfee Labs described Japanese and Korean Android apps on Google Play that steal a mobile device’s phone number. We have now found two more Japanese chat apps that show similar...
View ArticleSocial Media Manipulation Is For Real, Some Call It As Crowd-Turfing!
An Indian investigative portal Cobrapost, recently released a report on alleged online reputation smearing/management/campaigns designed to gain/destroy political capital for who ever was the highest...
View ArticleAndroid/Balloonpopper Sums Up Mobile Threat Landscape in 2013
WhatsApp has received more than its fair share of hits from Trojans attempting to target its large user base and worldwide popularity, but only a handful of those possesses the threat level of this new...
View ArticleAnalyzing the Recent Windows Zero-Day Escalation of Privilege Exploit
Recently we caught a malicious sample that exploits a PDF vulnerability–CVE-2013-3346, we believe–and executes after a use-after-free condition occurs. During our analysis we noticed that this PDF...
View ArticleProduct Coverage and Mitigation for CVE-2013-5065
On November 27th, 2013, Microsoft published Security Advisory 2914486, which coverers a elevation of privilege vulnerability in certain versions of Windows XP and Windows Server 2003. The flaw lies in...
View ArticleSuspicious Apps on Google Play Leak Google Account IDs
The Google account ID (or account name), which in most cases is a Gmail address, is one of the key identifiers of Android device users. McAfee has confirmed a substantial amount of suspicious apps...
View ArticleAnother Bad Idea: Handing Your Unlocked Phone to Strangers
You wouldn’t hand your unlocked mobile phone to strangers, would you? Especially not if they keep it for some minutes, unmonitored, to make configuration changes, right? I’m currently traveling in...
View ArticleReveton Ransomware Hides Behind Encryption
Reveton belongs to a family of ransomware that locks screens and prevents users from using their machines until they pay a certain amount. Reveton may be downloaded to a victim’s machine from...
View ArticleMcAfee Labs 2014 Threats Predictions
As we wind down the year, it’s a time to reflect, but also to look forward. Some of us may be thinking about resolutions and what we need to do in the upcoming year—exercise more, eat better, have...
View Article2014 Threats Predictions: Everyone Wants a Piece of Big Data
This post is the first in a series of articles that will expand on the recently released McAfee Labs 2014 Threats Predictions. In this and upcoming posts, McAfee Labs researchers will offer their views...
View Article2014 Threats Predictions: Social Media Changes Keep Users Off Balance
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In this and related posts, McAfee Labs researchers offer their views of new and...
View Article2014 Threats Predictions: Cloud Attacks Could Lead to Data Loss
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In this and related posts, McAfee Labs researchers offer their views of new and...
View Article2014 Threats Predictions: Mobile Attackers to Benefit From New Payment Methods
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In this and related posts, McAfee Labs researchers offer their views of new and...
View ArticleVariant of Pony Botnet Pickpockets Bitcoin Users
Last month the Pony Botnet became a household name when it was revealed that it had stolen more than two million social networking account passwords. This rather eye-catching headline is a side effect...
View Article2014 Threats Predictions: Software Defined Networking Promises Greater...
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In this and related posts, McAfee Labs researchers offer their views of new and...
View Article2014 Threats Predictions: Cybercrime and Hacktivism Will Continue to Grow
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In this and related posts, McAfee Labs researchers offer their views of new and...
View Article