The word botnet or bot is short for robot network. A botnet is a group of Internet-connected personal computers that have been infected by a malicious application (malware) that allows a hacker to control the infected computers or mobile devices without the knowledge of the device owners. When malware is launched on your computer or Read more…
Contributor: Avdhoot Patil
Phishers have already made their mark in Southeast Asia by targeting Indonesians. For the past couple of years, celebrities have been their key interest in the region. Aura Kasih and Ahmad Dhani are good examples. In March 20…
For four days, the streets of Barcelona were flooded with mobile enthusiasts from every corner of the globe, looking to see what ground-breaking announcements would be coming out of Mobile World Congress 2013 (MWC). Held from February 25th to February 28th, more than 72,000 attendees from 200 countries passed through the MWC entrance doors to Read more…
While testing malware recently, we got some logs from our automated analysis system showing a few samples that are only partially replicated. We have heuristics that predict the behavior of a sample; but if that prediction fails, then the heuristics identify the state of a sample and decide if it is worth sending to our Read more…
Question of the week: I just updated my avast to version 8. The new look is great! There’s a feature called Software Updater that looks interesting. How do I use it? Great question, and thanks for the compliment on avast! 8’s new look. To answer your question about the new avast! Software Updater, let me […]
Just this weekend, some 50 million Evernote users, myself included, were asked to reset our account passwords after their security team saw signs of an attempted attack on information, including usernames, passwords, and application-linked email addresses. Luckily, there is no evidence to suggest that payment information for Evernote Business or Evernote Premium account holders has Read more…
As most of our readers and fans know, we now protect more devices (PC, Mac, and Android) globally than any other antivirus provider. As our business model is such that our freemium software serves as our ‘advertising’ (we don’t do traditional advertising), and most of our users come to us via referrals, we receive quite […]
The Cryptographer’s Panel at RSA included Professor Dan Boneh of Stanford University, who sat down with Whitfield Diffie, Ronald Rivest, Adi Shamir to talk about the most common failures of mobile apps and SSL encryption algorithms. A lively disc…
It has been two or three months since I last blogged about Android malware. But that definitely doesn’t mean there aren’t any new threats. There are plenty! Here are two quick comparisons from the last two years: Growth of the malware problem of the platform in January 2012 compared with January 2013 is far from […]
While working on the release of the latest version of the McAfee Network Security Platform, which offers advanced malware and botnet protection, we tested a sample of the malware Red October. With the help of our in-house advanced botnet analysis framework, we analyzed the network traffic generated by this sample and tracked its communications with the Read more…