Mobile Drive-By Malware example

      1 Comment on Mobile Drive-By Malware example

Several days ago we received a complaint about javascrpt.ru. After a bit of research, we found that it tries to mimic ajax.google.com and jquery, but the code is an obfuscated/packed redirector. After removing two layers of obfuscation, we found a list of conditions checking visitors’ user Agent. From these conditions. we got a clue and […]

An Overview of Messaging Botnets

      No Comments on An Overview of Messaging Botnets

In the quarterly McAfee Threats Reports we offer our readers some charts on the prevalence of messaging botnets. For the last quarter of 2012, we announced the continuing decline in global messaging botnet infections as well as in former leaders Festi and Cutwail (see page 23). In this blog, I will detail the evolution of Read more…

Pros and Cons of Mobile Banking

      No Comments on Pros and Cons of Mobile Banking

Many major commercial banks are now offering consumers the choice to make deposits, send money, and perform other routine tasks using a mobile app. Bank customers can now use a smartphone or tablet for basic transactions like check deposits and bill payments, making it easier to keep an eye on finances without a trip to Read more…

Malware Attacks Targeting Hugo Chavez’s Death

Rumors of Venezuelan President Hugo Chavez’s death were rampant on the news and Internet over the past month, and last Tuesday, the Venezuelan Vice President confirmed that Chavez died after a two year battle with cancer. Chavez’s death has…

Mobile Payments 101: Join @McAfeeSECURE 3/14 for #eCommChat with Sebastian Castro and William Chen of Leaf

Accepting mobile payments is quickly becoming an important element of any mobile commerce strategy, and many merchants are moving to adopt it. However, like so many new technologies, security is still an issue when it comes to the mobile payments space. Whether it’s mobile POS, NFC, or other digital currencies, navigating the compliance and usability Read more…

Preventing Modern Attacks with Modern Defense and Testing Methodologies

The Problem  Cybercriminals are targeting organizations successfully in spite of traditional security measures as noted recently by the NY Times and a front page article in the Wall Street Journal on cyber espionage.  This issue is driven by the cybercriminal gangs’ ability to compromise vulnerable systems using sophisticated reconnaissance and penetration tactics.  So, how do Read more…

Android Malware Goes Bollywood

      No Comments on Android Malware Goes Bollywood

We already know that mobile malware is growing at a fantastic rate, but we now see a new trend that concerns us: specific regions targeted by mobile threats. Just last week McAfee Labs blogged about a new malware threat targeting phone owners in South Korea. Today we have identified another new strain of Android Trojan Read more…

Key online security points to consider in 2013

Online threats have become a fact of life for people who regularly use the internet. However, rather than worrying about it or waiting for potentially important details to be compromised, there a number of key points which you can consider to counter a…