This week the Sorbonne University and the French Department of Justice hosted a meeting, the World and Development Institute (IMODEV) International Cybercrime, CyberThreat and CyberFraud Seminar. The audience heard eminent speakers including Pierre Joxe, a Member of the French Constitutional Council and former socialist Minister of the Interior, and Jacques Godfrain, the writer of the so-called ...
Read Blog
For the last couple of weeks I’ve been presenting around the U.S. at events such as Secure360 in St. Paul, and the McAfee Executive Summits in Boston and New York. One question I was asked at every event, was “What is a mobile device?" The flippant answer of course which after two weeks of middle ...
Read Blog
It’s not breaking news that fake-alert Trojans infections are growing. But it’s worrying for Mac OS X users to find themselves a target for those attacks. As my colleague Tad Heppner mentioned in his post, a scareware called MacDefender was spotted in the wild. Mac users can be fooled by those fake alerts because malware ...
Read Blog
Fake-alert Trojans, also known as scareware, fool consumers by claiming imaginary threats, and insisting its victims purchase a product to repair the "infected" systems. They exist in Windows and Macintosh environments. In my recent report explaining this threat, I included a table showing the approximate number of scareware products with their known release dates: After ...
Read Blog
Most of today's malware works on Windows and its apps, because it can affect a lot of people around the world. However, other platforms are becoming more popular every day and attracting bad guys who are starting to create malicious code for other systems. (For a few examples, see BlackHoleRAT, HellRaiser RAT, and a fake-alert ...
Read Blog
Adobe released a security advisory warning the users of a zero-day vulnerability in Adobe Flash Player Versions 10.2.152.33 and earlier. An exploit targeting this vulnerability was embedded inside Microsoft Excel documents and was used to deliver the malicious code to the victims. McAfee Labs performed a detailed technical analysis of the exploit and learned that ...
Read Blog
I suppose this was inevitable. The reported death of Osama Bin Laden is just too good a lure for cybercriminals and scammers to pass up. We at McAfee Labs certainly anticipated this and have been tracking it since the first reports came out of Washington early this morning. We have seen variations of what I ...
Read Blog
Working in the security industry brings about a myriad of challenges. This is especially true for vendors. We must do our best to educate and inform. At the same time, we want to avoid laying on the FUD--or scaring customers into making poorly educated security decisions. Which brings us to the recent LizaMoon attacks. There ...
Read Blog
Over the weekend Google released the Android Market Security Tool to help clean up  devices infected with the DroidDream malware. The Android/DrdDream family of malware used a pair of exploits (Expoit/LVedu and Exploit/DiutesEx) to gain root access on vulnerable Android devices.  More than 50 Android applications were reported to be infected; all were pulled from the Android ...
Read Blog

Books Fight Back

By on
You know I always thought that at some point, printed books would go the same way as vinyl.  Despite sporadic revivals by the music industry and its use by particular groups such as the electronic and “mixmasters,” the majority of households have already replaced turntables for the latest technologies.  Equally the latest published shopping trends ...
Read Blog