My favorite avast! user feedback so far in 2013, from a ‘moonshiner’ in Wyoming

As most of our readers and fans know, we now protect more devices (PC, Mac, and Android) globally than any other antivirus provider. As our business model is such that our freemium software serves as our ‘advertising’ (we don’t do traditional advertising), and most of our users come to us via referrals, we receive quite […]

Sneaky little bastard

      No Comments on Sneaky little bastard

It has been two or three months since I last blogged about Android malware. But that definitely doesn’t mean there aren’t any new threats. There are plenty! Here are two quick comparisons from the last two years: Growth of the malware problem of the platform in January 2012 compared with January 2013 is far from […]

Red October Botnet Hides Calls to Control Server

While working on the release of the latest version of the McAfee Network Security Platform, which offers advanced malware and botnet protection, we tested a sample of the malware Red October. With the help of our in-house advanced botnet analysis framework, we analyzed the network traffic generated by this sample and tracked its communications with the Read more…

How McAfee SECURE Services Can Help Enterprises

Whether you are a large-scale online business or a mom and pop storefront, all merchants can and must have a strong security strategy. With Retail now the number one most targeted industry, accounting for 48 percent of all data breach incidents in 2012 alone, it is crucial for organizations of any size to protect themselves Read more…

Latest Java Zero-Day Shares Connections with Bit9 Security Incident

Symantec recently received information on a new Java zero-day, Oracle Java Runtime Environment CVE-2013-1493 Remote Code Execution Vulnerability (CVE-2013-1493).  The final payload in the attack consisted of a DLL file, detected by Symantec as Tro…

Fake Antivirus Renewal Email Rises from the Dead

Over the last few years, many reports, white papers, and blogs have been released detailing targeted attacks. For example, some attacks employ sophisticated infection methods, such as watering hole attacks, and some rely on exploit code hidden in docum…

How To Keep Your Teen’s Private Data Safe When They Are ‘In Lurve’!!!!!

Teen love can be all consuming. And don’t say you don’t remember – we’ve all gone through it! The world stops. Nothing else matters (particularly not school work). Love takes over… You are Sitting On Top Of The World (to use Delta Goodrem’s expression!) When you are in love (and not particularly worldly) you may Read more…