While testing malware recently, we got some logs from our automated analysis system showing a few samples that are only partially replicated. We have heuristics that predict the behavior of a sample; but if that prediction fails, then the heuristics identify the state of a sample and decide if it is worth sending to our Read more…
Just this weekend, some 50 million Evernote users, myself included, were asked to reset our account passwords after their security team saw signs of an attempted attack on information, including usernames, passwords, and application-linked email addresses. Luckily, there is no evidence to suggest that payment information for Evernote Business or Evernote Premium account holders has Read more…
The Cryptographer’s Panel at RSA included Professor Dan Boneh of Stanford University, who sat down with Whitfield Diffie, Ronald Rivest, Adi Shamir to talk about the most common failures of mobile apps and SSL encryption algorithms. A lively disc…
While working on the release of the latest version of the McAfee Network Security Platform, which offers advanced malware and botnet protection, we tested a sample of the malware Red October. With the help of our in-house advanced botnet analysis framework, we analyzed the network traffic generated by this sample and tracked its communications with the Read more…
Whether you are a large-scale online business or a mom and pop storefront, all merchants can and must have a strong security strategy. With Retail now the number one most targeted industry, accounting for 48 percent of all data breach incidents in 2012 alone, it is crucial for organizations of any size to protect themselves Read more…
Symantec recently received information on a new Java zero-day, Oracle Java Runtime Environment CVE-2013-1493 Remote Code Execution Vulnerability (CVE-2013-1493). The final payload in the attack consisted of a DLL file, detected by Symantec as Tro…
Over the last few years, many reports, white papers, and blogs have been released detailing targeted attacks. For example, some attacks employ sophisticated infection methods, such as watering hole attacks, and some rely on exploit code hidden in docum…
Teen love can be all consuming. And don’t say you don’t remember – we’ve all gone through it! The world stops. Nothing else matters (particularly not school work). Love takes over… You are Sitting On Top Of The World (to use Delta Goodrem’s expression!) When you are in love (and not particularly worldly) you may Read more…
Wissen Sie, wie viele Website-Kennwörter Ihre Kollegen im Durchschnitt haben? Sie werden es kaum glauben: 25. Beeindruckend, nicht wahr? Weniger beeindruckend ist, dass sich die meisten Internetnutzer mit nur 6,5 Kennwörtern schütze…