Quantcast
Channel: McAfee Labs | McAfee Blogs
Browsing all 745 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Security Best Practices for Azure App Service Web Apps, Part 3

This post was written by Piyush Mittal. Microsoft’s Azure App Service is a fully managed Platform as a Service for developers that provides features and frameworks to quickly and easily build apps for...

View Article


Image may be NSFW.
Clik here to view.

5 Steps to Enhance Security of Cloud Applications

When you move applications to the cloud, the attack surface changes while the vulnerabilities at application, database, and network level persist. To address these issues, securing the cloud perimeter,...

View Article


Image may be NSFW.
Clik here to view.

Attacks on SWIFT Banking System Benefit From Insider Knowledge

In recent months, we’ve seen headlines about the compromise of a bank in Bangladesh from which cybercriminals attempted to steal US$951 million. The malware they used was able to manipulate and read...

View Article

Image may be NSFW.
Clik here to view.

Malware Mystery: JS/Nemucod Downloads Legitimate Installer

JS/Nemucod is the detection name given to a family of malicious JavaScript downloaders that have appeared in spam campaigns since last year. They usually arrive as an email attachment, embedded in a...

View Article

Image may be NSFW.
Clik here to view.

How to: Testing Android Application Security, Part 1

The popularity of Android devices and applications makes it a target for malware and other threats. This post is the first in a short series on Android application security. Similar to its use for web...

View Article


ISAO Group Hosts Productive 3rd Public Meeting

This post first appeared at Policy@Intel. The Information Sharing and Analysis Organization Standards Organization (ISAO SO) held its Third Public Forum on May 18–19 in Anaheim, California. More than...

View Article

Image may be NSFW.
Clik here to view.

Which Cybersecurity Data Should You Trust?

  Limitations of security data We are constantly battered by cybersecurity data, reports, and marketing collateral—and we shouldn’t treat all of this information equally. Security data has inherent...

View Article

Image may be NSFW.
Clik here to view.

Android Banking Trojan ‘SpyLocker’ Targets More Banks in Europe

Since the discovery of the Android banking Trojan SpyLocker, Intel Security has closely monitored this threat. SpyLocker first appeared disguised as Adobe Flash Player and targeted customers of banks...

View Article


Image may be NSFW.
Clik here to view.

Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes

Darkleech is an Apache module on the dark web that distributes malware. This tool, which appeared in 2012, was first used to infect many Apache servers and later sites running Microsoft IIS. The...

View Article


Image may be NSFW.
Clik here to view.

Android Spyware Targets Security Job Seekers in Saudi Arabia

The Middle East is the new Wild West of mobile malware, especially for targeted attacks and intelligence gathering campaigns. During the past few years, Intel Security Mobile Research has monitored and...

View Article

Image may be NSFW.
Clik here to view.

TorrentLocker Campaign Exploits Spanish Utility Brand

At Intel Security we see waves of new ransomware just about every week, with most popular families spreading via spam, exploit kits, and other methods. Recently we detected a new campaign using the...

View Article

Image may be NSFW.
Clik here to view.

Trillium Exploit Kit Update Offers ‘Security Tips’

McAfee Labs has previously blogged about the Trillium Exploit Kit Version 3.0, which is commonly used to create and distribute malware. Last week, Version 4.0 appeared on several underground forums. We...

View Article

Image may be NSFW.
Clik here to view.

Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript

This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni. During the last couple of weeks, McAfee Labs has observed a huge increase in spam related to Locky, a...

View Article


Image may be NSFW.
Clik here to view.

Threat Actors Employ COM Technology in Shellcode to Evade Detection

COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it is one of the fundamental architectures in Windows. From the...

View Article

Image may be NSFW.
Clik here to view.

Zcrypt Expands Reach as ‘Virus Ransomware’

Intel Security has recently seen a new kind of ransomware–Zcrypt—that can self-replicate. This “virus ransomware” arrives via email in a malicious attachment or by usurping an Adobe Flash Player...

View Article


Experts Discuss the 2016 Verizon DBIR: June #SecChat

Cybersecurity in 2016 has been full of sensational headlines. Ransomware has shut down multiple hospitals, millions of credentials have been pilfered, and countless companies have had their records...

View Article

Image may be NSFW.
Clik here to view.

‘Thrones’ Jon Snow Appears to Employ Neutrino Exploit Kit

You read that right. Jon Snow appears to be back from the dead. That would make “Game of Thrones” fans happy, but unfortunately this Jon Snow is not the same character. This John (with an h) Snow is...

View Article


Image may be NSFW.
Clik here to view.

Testing Race Conditions in Web Applications

When determining black-box or gray-box application security (penetration testing), an assessor mostly concentrates on the top 10 Open Web Application Security Project vulnerabilities and rarely worries...

View Article

Image may be NSFW.
Clik here to view.

Mobile App Collusion Highlights McAfee Labs Threats Report

I would be lost without my smartphone and its many convenient features. I look at my calendar and click to schedule an online meeting, inviting attendees from my contact list. I use my airline app to...

View Article

Image may be NSFW.
Clik here to view.

Intel Innovates to Stop Cyberattacks

Intel, in partnership with Microsoft, has published a technology preview, showing how innovation in silicon architecture can help protect against advanced code-reuse attack techniques. This is an...

View Article
Browsing all 745 articles
Browse latest View live