‘McAfee Labs Threats Report’ Offers Primer on Security Data Science,...
Analytics, big data, automation, and machine learning are all terms we use when talking about the future of cybersecurity. As the volume of security data increases, data science will become an...
View ArticleHow Can We Stop ‘ROP’ Cyberattacks?
IBM recently announced a software-oriented solution to help eradicate attacks by return-oriented programming (ROP) malware. ROP malware is a significant and growing problem in the industry. Crafty...
View ArticleMacro Malware Employs Advanced Sandbox-Evasion Techniques
During the past couple of weeks, McAfee Labs has observed a new variant of macro malware. With this variant when we click on a doc file, we see the message “This document is protected against...
View ArticleSharing Cybersecurity Threat Intelligence Is the Only Way We Win
Cybersecurity is a team sport. The bad guys share information, expertise, and code as they help one another. The good guys must do the same to keep pace. Sharing threat intelligence is a key aspect in...
View ArticleCTO Q&A: Campaign Hacks, Yahoo! and Clinton-Trump
Over the last several days, we’ve seen headlines on potential cyber-attacks on state voter registries, cybersecurity front and center in the Clinton-Trump presidential debate, and new revelations into...
View ArticleNew Security Reality for Internet of Things
Recent distributed denial of service (DDoS) attacks are forcing a shift in how we think about the Internet of Things (IoT). The dangers are expanding as attackers are taking advantage of billions of...
View ArticleEveryone Loves Selfies, Including Malware!
I was talking with some of my coworkers the other day about why I wanted to jump to the larger iPhone 7 Plus. For me it came down to the camera. I travel a lot for work and even though photography is...
View ArticleAndroid Banking Trojan Asks for Selfie With Your ID
In the first half of 2016 we noticed that Android banking Trojans had started to improve their phishing overlays on legitimate financial apps to ask for more information. Victims were requested to...
View ArticleRansomware Variant XTBL Another Example of Popular Malware
We have seen a huge increase in ransomware during the past couple of years. At McAfee Labs we have recently received a sample of the low-profile XTBL, a ransomware family that encrypts files and...
View ArticleNo More Ransom Adds Law Enforcement Partners From 13 Countries
Intel Security and Kaspersky Labs today announced that 13 law enforcement agencies have joined No More Ransom, a partnership between cybersecurity industry and law enforcement organizations to...
View ArticleHow to: Testing Android Application Security, Part 4
One of the best ways to develop secure Android applications is to engage in penetration (pen) testing, in effect trying to break into your application just as an attacker might do. This is the fourth...
View ArticlePassword-Protected Attachment Serves Ransomware
Attacks by macro malware carrying ransomware are growing, as we have recently reported. Since early March we have seen macro malware using high-obfuscation algorithms to hide itself from static and...
View ArticleUnfolding the Mystery of Cerber Ransomware’s Random File Extension
In an earlier blog, we discussed the evolution of the popular Cerber ransomware from Version 1 to 2. Recently we came across two newer versions of Cerber (we’ll call them Versions 3 and X). Cerber 3...
View ArticleHow to Secure the Future of the Internet of Things
The world of security for the Internet of Things just became more complex. IoT devices are no longer a potential threat to their owners; now they pose a significant threat to everything connected to...
View ArticleHow ‘Weaponized’ Medical Data Could Be as Damaging as Clinton’s Emails or...
The 2016 presidential election in the United States will be remembered for a great many things. Never before in US history has the disclosure or nondisclosure of personal information figured so...
View ArticleA ‘Second Economy’ Prognosis for Health Care Cybersecurity
Intel Security CTO Steve Grobman has pointed out that gaining the upper hand in cybersecurity requires that we extend our thinking beyond the physical economy of money, assets, goods, and services to a...
View ArticleThe Latest IoT Device I Do Not Want Hacked
What if someone hacked this remotely controlled semiautonomous tractor? I am a cybersecurity guy and a huge fan of technology. One of the challenges we face in the security industry is the growth of...
View ArticleHow Valuable is Your Healthcare Data?
Health care is a hot topic in security right now. A quick search for “hospital ransomware” returns a laundry list of news reports on hospitals as targets of cyberattacks. However, it is not just...
View ArticleMicrosoft’s June Patch Kills Potential CFG Bypass
After applying Microsoft’s June patch, we noticed some interesting changes that prevent a security bypass of Windows’ Control Flow Guard (CFG). The changes are in the Shader JIT compiler of the Windows...
View ArticleJavaScript-PHP Joint Exercise Delivers Nemucod Ransomware
The ransomware Nemucod has been very prevalent in the last few months. Nemucod’s habit of frequently changing its delivery mechanism and infection vector to evade detection makes this threat very...
View Article