Intel Security

McAfee Labs Blog

  • More Capable IoT Botnets to Emerge as the ‘Pros’ Enter the Fray

    On the heels of severe distributed denial of service (DDoS) attacks, we see new botnets emerging that are powered by the Internet of Things (IoT). There are already hundreds of such botnets in the underground hacking ecosystem, from which services, code, and specific attacks can be purchased or acquired. New botnets are... Read More

  • Talking About Cyber Risks Educates the Community

    In the last 12 months, we have seen an unprecedented number of cyberattacks occur or come to light.Sophisticated attacks against governments, businesses, consumers, and the pillars of the Internet itself.The future appears to be fraught with runaway risks.Can security tame data breaches, ransomware, massive denial of service assaults,... Read More

  • Cerber Ransomware Now Hunts for Databases

    Cerber is one of the most popular ransomware packages. It has upgraded itself to also target databases. It is available for purchase as a service (ransomware as a service) on the “dark net” as part of an affiliate program. Cerber is part of a turnkey service in which clients share 40% of their profits with …

    The post Cerber Ransomware Now Hunts for... Read More

  • Top 5 Things to Know About Recent IoT Attacks

    Recent Internet attacks have resulted in several popular sites becoming unreachable. The list includes Twitter, Etsy, Spotify, Airbnb, Github, and The New York Times. These incidents have brought to light a new threat to online services: botnets powered by the Internet of Things (IoT). Distributed denial of service (DDoS) attacks have been... Read More

  • The Latest IoT Device I Do Not Want Hacked

    What if someone hacked this remotely controlled semiautonomous tractor? I am a cybersecurity guy and a huge fan of technology. One of the challenges we face in the security industry is the growth of the Internet of Things (IoT). IoT is about connecting everyday objects to the Internet. It might be a toaster, alarm clock, …

    The post The Latest IoT... Read More

  • A ‘Second Economy’ Prognosis for Health Care Cybersecurity

    Intel Security CTO Steve Grobman has pointed out that gaining the upper hand in cybersecurity requires that we extend our thinking beyond the physical economy of money, assets, goods, and services to a Second Economy defined by the currencies of trust, time, and money. As in other industries, health care is working toward maximizing... Read More

  • How ‘Weaponized’ Medical Data Could Be as Damaging as Clinton’s Emails or Trump’s Videos

    The 2016 presidential election in the United States will be remembered for a great many things. Never before in US history has the disclosure or nondisclosure of personal information figured so prominently in public debate. Never before has the ability to compromise and disclose personal information been used as a political weapon to... Read More

  • How to Secure the Future of the Internet of Things

    The world of security for the Internet of Things just became more complex. IoT devices are no longer a potential threat to their owners; now they pose a significant threat to everything connected to the Internet. The old IoT security problem For the past year, the cybersecurity and IoT communities have been at odds regarding …

    The post How to... Read More

  • Unfolding the Mystery of Cerber Ransomware’s Random File Extension

    In an earlier blog, we discussed the evolution of the popular Cerber ransomware from Version 1 to 2. Recently we came across two newer versions of Cerber (we’ll call them Versions 3 and X). Cerber 3 has few changes but Version X has some new behavior that caught our attention. (We call this version X, …

    The post Unfolding the... Read More

  • Password-Protected Attachment Serves Ransomware

    Attacks by macro malware carrying ransomware are growing, as we have recently reported. Since early March we have seen macro malware using high-obfuscation algorithms to hide itself from static and traditional antimalware detection techniques. Macro malware continues to evolve and use new tricks to evade detection. In addition to these evasion... Read More

  • How to: Testing Android Application Security, Part 4

    One of the best ways to develop secure Android applications is to engage in penetration (pen) testing, in effect trying to break into your application just as an attacker might do. This is the fourth in a series of posts on pen testing Android applications.In the firstwe set up the testing environment and captured traffic.In …

    The post How to: Testing Android Application... Read More

  • No More Ransom Adds Law Enforcement Partners From 13 Countries

    Intel Security and Kaspersky Labs today announced that 13 law enforcement agencies have joined No More Ransom, a partnership between cybersecurity industry and law enforcement organizations to provide ransomware victims education and decryption tools through Intel Security, Kaspersky Labs, Dutch National Police, and... Read More

  • Ransomware Variant XTBL Another Example of Popular Malware

    We have seen a huge increase in ransomware during the past couple of years. At McAfee Labs we have recently received a sample ofthelow-profile XTBL, a ransomware family that encrypts files and demands ransom from its victims to decrypt the files. Like other ransomware variants, XTBL propagates through a wide range of spam campaigns.... Read More

  • Android Banking Trojan Asks for Selfie With Your ID

    In the first half of 2016 we noticed thatAndroid banking Trojans had started to improve theirphishing overlays on legitimate financial apps to ask for more information. Victims were requested to provide “Mother’s Maiden Name,” “Father’s Middle Name,” “Maternal Grandmothers Name,” or a “Memorable Word.” Attackers used that data to respond to... Read More

  • Everyone Loves Selfies, Including Malware!

    I was talking with some of my coworkers the other day about why I wanted to jump to the larger iPhone 7 Plus. For me it came down to the camera. I travel a lot for work and even though photography is something of a hobby of mine, I don’t always have my “good camera” …

    The post Everyone Loves Selfies, Including Malware! appeared first on McAfee Blogs.

    Read... Read More
  • New Security Reality for Internet of Things

    Recent distributed denial of service (DDoS) attacks are forcing a shift in how we think about the Internet of Things (IoT). The dangers are expanding as attackers are taking advantage of billions of IoT devices, conscripting them into their botnet armies for massive DDoS attacks. Nontraditional risks The estimates vary, but they suggestbetween …

    The... Read More

  • CTO Q&A: Campaign Hacks, Yahoo! and Clinton-Trump

    Over the last several days, we’ve seen headlines on potential cyberattacks on state voter registries, cybersecurity front and center in the Clinton-Trump presidential debate, and new revelations into the Yahoo! cyber-breach that appears to have compromised more than 500 million user accounts. Intel Security CTO Steve Grobman fielded a number of questions... Read More

  • Sharing Cybersecurity Threat Intelligence Is the Only Way We Win

    Cybersecurity is a team sport. The bad guys share information, expertise, and code as they help one another. The good guys must do the same to keep pace. Sharing threat intelligence is a key aspect in which the knowledge gained by the owners of sensor networks can share data withthe security analysis community. This generosity …

    The post Sharing... Read More

  • Macro Malware Employs Advanced Sandbox-Evasion Techniques

    During the past couple of weeks, McAfee Labs has observed a new variant of macro malware. With this variant when we click on a doc file, we see themessage “This document is protected against unauthorized use. Enable Editing and Enable Content to read content” along with a request to enable macros. If a user clicks …

    The post Macro Malware... Read More

  • How Can We Stop ‘ROP’ Cyberattacks?

    IBM recently announced a software-oriented solution to help eradicate attacks by return-oriented programming (ROP) malware. ROP malware is a significant and growing problem in the industry. Crafty hackers will use snippets of code from other trusted programs and stitch themtogether to create their attacks. This method has become a very popular and effective... Read More

  • ‘McAfee Labs Threats Report’ Offers Primer on Security Data Science, Analytics, Big Data, Machine Learning

    Analytics, big data, automation, and machine learning are all terms we use when talking about the future of cybersecurity. As the volume of security data increases, data science will become an important weapon to disrupt adversaries. Too often, these terms are used as synonyms, but they refer to... Read More

  • ‘McAfee Labs Threats Report’ Delves Into Dangers of Data Loss

    Data is leaking out of your organization: accidentally or intentionally, by internals or externals, physically or electronically. During the past year, we have performed extensive research to identify what data is being targeted, who is taking it, how they are getting it out, and the best practices to reduce your exposure to data loss.... Read More

  • ‘McAfee Labs Threats Report’ Examines Whether Ransomware Is Coming to a Hospital Near You

    Delivering uninterrupted services with immediate access to information is not an easy task. Doing it with legacy systems, a fragmented workforce, and inconsistent security is a monumental job. Unfortunately, this is the state of many hospitals, leading the criminal underground to their back doors. Ransomware attackers have shifted focus, moving from... Read More

  • Hardware Hack Bypasses iPhone PIN Security Counter

    A security researcher from the University of Cambridge has found a way to hack the iPhone NAND memory hardware to sufficiently bypass an important security feature, allowing a brute-force attack against the passcode lock of an iPhone 5C. This is the same lock thatstymied the FBI as part of the highly publicized privacy case in …

    The post Hardware... Read More

  • Unregulated at Any Speed: DoT’s Cybersecurity Policy for Self-Driving Cars

    Despite headlines, hype, and hysteria, US government rightly chooses cybersecurity guidance over regulation. The Obama administration today unveiled its long-awaited safety policy for self-driving or automated vehicles (AVs). Despite the recent tragic death of a passenger travelling in a Tesla-built AV, and persistent discussions of... Read More

  • Cryptocurrencies a Target for Cybercriminals, Part 2: Social Platforms Come Next

    One target of cybercriminals is cryptocurrencies, which hold tremendous wealth but are largely anonymous. This limits the attack surface mostly to avenues requiring complex technical approaches. Always preferring the path of least resistance, many fraudsters and online thieves prefer to target people rather than... Read More

  • Locky Ransomware Hides Inside Packed .DLL

    McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in an earlier blog).Locky is aggressively distributed via a JavaScript-based downloader sent as an attachment in spam emails. Since its first variant Locky has taken advantage of compromised domains to download itsmalicious executable. Recently it has downloaded a... Read More

  • Cryptocurrencies a Target for Cybercriminals, Part 1: the Risks of Innovation

    All cryptocurrencies are a target for cybercriminals. Anywhere there is value, criminals, fraudsters, and charlatans will soon follow. Call it the Willie Sutton principle. Sutton, a famous bank robber in the 1920s–30s, was asked why he robbed banks. His reply was “Because that’s where the money is.” The simplicity rings... Read More

  • The Quarterly Threats Report: What Does It Mean for You?

    The latest edition of the Quarterly Threats Report (QTR) was released this week by McAfee Labs. If you’re not familiar with them, McAfee Labs is our research organization tasked with researching all the latest threats that people are seeing out there in the wild as well as looking as trends that help indicate what the …

    The post The Quarterly Threats Report: What Does... Read More

  • Machine Learning, the Unsung Hero in the Latest ‘Threats Report’

    The story about ransomware in hospitals in our newly published McAfee Labs Threats Report: September 2016 will probably garner most of the media’s attention, but I think the most interesting story in the report is about machine learning. Here’s why. Intel Security has used machine learning in our classification models since the... Read More

Intel Security in Spiceworks

  • Cybersecurity and Privacy Director
    Jun 29, 2017 at 04:41 UTC
  • About Intel Security

    Similar Vendors