Quantcast
Channel: IT Secure Site » McAfee
Browsing latest articles
Browse All 128 View Live

Android Fake AV Hosted in Google Code Targets South Koreans

During a final dual years we have celebrated a accelerated find of Android malware by a confidence industry. Malware authors currently mostly emanate and discharge feign “antimalware” apps that copy a...

View Article



Bitcoin Headlines Attract Malware Developers

Bitcoin issues have been front-page news in new months, generally after a startling Apr sell rate. In a latest McAfee Threats Report, for a second entertain of 2013, we plead this topic. The following...

View Article

Malware Authors Employ Variety to Evade Security Detection

In a McAfee Labs blog we have lonesome many techniques that malware uses to hedge code-based detection. In my prior blog we discussed procedure voluntary and procession addition techniques to hedge...

View Article

Cidox Trojan Spoofs HTTP Host Header to Avoid Detection

Lately, we have seen a good series of samples generating some engaging network trade by a programmed framework. The HTTP network settlement generated contains a few engaging parameters, names like...

View Article

Hesperus (Evening Star) Shines as Latest ‘Banker’ Trojan

Hesperus, or Hesperbot, is a newly detected landowner malware that steals user information, generally online banking credentials. In duty it is identical to other “bankers” in a wild, generally Zbot....

View Article


Aggressive Ad Module Scans Android Apps

During a slight patrols of renouned marketplaces charity Android applications we recently came opposite some questionable applications hosted on a renouned Google Play. The applications are distributed...

View Article

Andromeda Botnet Hides Behind AutoIt

Last month, we posted a blog about an boost in a use of AutoIt scripts by malware authors to lift out antagonistic activities. Attackers have used AutoIt scripts for a prolonged time, and they are...

View Article

Vertexnet Botnet Hides Behind AutoIt

Recently we found some new malware samples regulating AutoIt to censor themselves. On serve research we found that those representation go to a Vertexnet botnet. They use mixed layers of obfuscation;...

View Article


Product Coverage and Mitigation for CVE-2013-3893

Microsoft Security Advisory (2887505) On Sep 17th, 2013, Microsoft published Security Advisory 2887505, that coverers a remote formula execution disadvantage in all upheld versions of Microsoft...

View Article


Variety of Android Threats Extends Around a World

As a many renouned mobile platform, Android has grown exponentially in new years, augmenting a marketplace for new developers to uncover their skills with novel applications. However, not all...

View Article
Browsing latest articles
Browse All 128 View Live




Latest Images