Android Malware Goes Bollywood

      No Comments on Android Malware Goes Bollywood

We already know that mobile malware is growing at a fantastic rate, but we now see a new trend that concerns us: specific regions targeted by mobile threats. Just last week McAfee Labs blogged about a new malware threat targeting phone owners in South Korea. Today we have identified another new strain of Android Trojan Read more…

Key online security points to consider in 2013

Online threats have become a fact of life for people who regularly use the internet. However, rather than worrying about it or waiting for potentially important details to be compromised, there a number of key points which you can consider to counter a…

What is a Botnet?

      No Comments on What is a Botnet?

The word botnet or bot is short for robot network.  A botnet is a group of Internet-connected personal computers that have been infected by a malicious applica­tion (malware) that allows a hacker to control the infected computers or mobile devices without the knowledge of the device owners. When malware is launched on your computer or Read more…

Phishers Target Myanmar with Wut Hmone Shwe Yee

Contributor: Avdhoot Patil
Phishers have already made their mark in Southeast Asia by targeting Indonesians. For the past couple of years, celebrities have been their key interest in the region. Aura Kasih and Ahmad Dhani are good examples. In March 20…

From the Phablet to GSMA’s Connected City, Was Mobile World Congress a Success?

For four days, the streets of Barcelona were flooded with mobile enthusiasts from every corner of the globe, looking to see what ground-breaking announcements would be coming out of Mobile World Congress 2013 (MWC). Held from February 25th to February 28th, more than 72,000 attendees from 200 countries passed through the MWC entrance doors to Read more…

Malware Behaves Oddly in Automated Analysis Environment

While testing malware recently, we got some logs from our automated analysis system showing a few samples that are only partially replicated. We have heuristics that predict the behavior of a sample; but if that prediction fails, then the heuristics identify the state of a sample and decide if it is worth sending to our Read more…

How do I use the new Software Updater in avast 8?

Question of the week:  I just updated my avast to version 8. The new look is great! There’s a feature called Software Updater that looks interesting. How do I use it? Great question, and thanks for the compliment on avast! 8’s new look. To answer your question about the new avast! Software Updater, let me […]

Recent Breach at Evernote Offers a Lesson in Password Management

Just this weekend, some 50 million Evernote users, myself included, were asked to reset our account passwords after their security team saw signs of an attempted attack on information, including usernames, passwords, and application-linked email addresses. Luckily, there is no evidence to suggest that payment information for Evernote Business or Evernote Premium account holders has Read more…