Author Archives: Hacker Medic

Malware Behaves Oddly in Automated Analysis Environment

While testing malware recently, we got some logs from our automated analysis system showing a few samples that are only partially replicated. We have heuristics that predict the behavior of a sample; but if that prediction fails, then the heuristics identify the state of a sample and decide if it is worth sending to our Read more…

Recent Breach at Evernote Offers a Lesson in Password Management

Just this weekend, some 50 million Evernote users, myself included, were asked to reset our account passwords after their security team saw signs of an attempted attack on information, including usernames, passwords, and application-linked email addresses. Luckily, there is no evidence to suggest that payment information for Evernote Business or Evernote Premium account holders has Read more…

Red October Botnet Hides Calls to Control Server

While working on the release of the latest version of the McAfee Network Security Platform, which offers advanced malware and botnet protection, we tested a sample of the malware Red October. With the help of our in-house advanced botnet analysis framework, we analyzed the network traffic generated by this sample and tracked its communications with the Read more…

How McAfee SECURE Services Can Help Enterprises

Whether you are a large-scale online business or a mom and pop storefront, all merchants can and must have a strong security strategy. With Retail now the number one most targeted industry, accounting for 48 percent of all data breach incidents in 2012 alone, it is crucial for organizations of any size to protect themselves Read more…

Latest Java Zero-Day Shares Connections with Bit9 Security Incident

Symantec recently received information on a new Java zero-day, Oracle Java Runtime Environment CVE-2013-1493 Remote Code Execution Vulnerability (CVE-2013-1493).  The final payload in the attack consisted of a DLL file, detected by Symantec as Tro…

Fake Antivirus Renewal Email Rises from the Dead

Over the last few years, many reports, white papers, and blogs have been released detailing targeted attacks. For example, some attacks employ sophisticated infection methods, such as watering hole attacks, and some rely on exploit code hidden in docum…

How To Keep Your Teen’s Private Data Safe When They Are ‘In Lurve’!!!!!

Teen love can be all consuming. And don’t say you don’t remember – we’ve all gone through it! The world stops. Nothing else matters (particularly not school work). Love takes over… You are Sitting On Top Of The World (to use Delta Goodrem’s expression!) When you are in love (and not particularly worldly) you may Read more…