What Operation Troy Teaches Us about Attribution & Intent
Today, McAfee Labs officially released the “Dissecting Operation Troy: Cyberespionage in South Korea” whitepaper, an in-depth study by our APT research team into a previously undetected lineage of...
View ArticleOperation Troy: OpenIOC Release
In conjunction with our investigation into Operation Troy, we will be releasing IOC data in the open and highly flexible OpenIOC Framework format. The McAfee Operation Troy IOC can be downloaded...
View ArticleNext Generation Firewalls Are Mission-Critical
The demands placed on enterprise networks are greater than at any time in the past. Data analysis has transformed into big data analysis. Banks process millions of transactions per second. Cloud...
View ArticleThe Security of Cars: Why the “Killer Demo” Isn’t Enough
Gone are the days when we only needed to worry about protecting our personal computers, or even our mobile devices. Every day devices that we take for granted are now being enhanced with powerful new...
View ArticleWhat is a Next-Generation Firewall?
In my last post, I outlined the business case for converting to a next-generation firewall. Essentially, it’s about protecting valuable IT assets in the face of advanced malware with sophisticated...
View ArticleSaying Goodbye to Dr. Schneck: With a Heavy Heart, but with Great Anticipation
This is a bittersweet moment for me. McAfee is losing a tremendous talent as Dr. Phyllis Schneck heads to the Department of Homeland Security to take on a critical leadership role in cyber security...
View ArticleSeven Myths of Advanced Malware – Myth #1: The Challenge is that I Cannot...
Advanced malware is the latest and potentially most destructive threat in cyberspace. These advanced threats are stealthy, targeted and very patient. Though often based on well-known malware with...
View ArticleSeven Myths of Advanced Malware — Myth #2: Sandboxing Blocks Malware
In my first post on the Seven Myths of Advanced Malware, I addressed the myth that “the challenge is, I can’t find advanced malware.” We decided that the myth is false, because you can find advanced...
View ArticleInvisible Protection — The Evolution of Mobile Containers
When it comes to protecting corporate data on end user computing devices, there has always been a need to strike the right balance between security and productivity. In a PC-dominated world, this...
View ArticleProduct Coverage and Mitigation for CVE-2013-3893
Microsoft Security Advisory (2887505) On September 17th, 2013, Microsoft published Security Advisory 2887505, which coverers a remote code execution vulnerability in all supported versions of Microsoft...
View Article
More Pages to Explore .....