#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity
Malware is on the rise. At the beginning of 2008, our malware collection had 10 million samples. Today we have already surpassed 70 million. Most of the malicious samples are Trojans (backdoors, downloaders, fake alerts), but there are also a lot of viruses, worms, and bots that in a short time can infect many computers Read more…
Bitcoin, developed in 2009 and based on the works of Satoshi Nakamoto, is a peer-to-peer (P2P) currency system created in open-source C++ programming code. Its inventor describes it as a purely peer-to-peer version of electronic cash that allows online payments to be sent directly from one party to another without going through a financial institution. Read more…
Let’s face it: Most people–even folks in the security industry–have a hard time explaining botnets (robot networks of infected computers) in a way that your Uncle Joe or Aunt Betty can understand. Is it really a big deal? Yes, it is. With the rapid growth in malware and bot infections we’re seeing, it’s important for Read more…
Tags: bot, botnet, Cybercrime, Data Protection, Endpoint Protection, facebook, global threat intelligence, identity protection, malware, social networking, spam, Web 2.0, zombie, zombie computers
Most of today’s malware works on Windows and its apps, because it can affect a lot of people around the world. However, other platforms are becoming more popular every day and attracting bad guys who are starting to create malicious code for other systems. (For a few examples, see BlackHoleRAT, HellRaiser RAT, and a fake-alert Read more…
Fluffy bunnies, cute chicks, Easter eggs… Does that sound dangerous to you? You wouldn’t think it was dangerous by the looks of it. It is so sweet I would just want to download it and send it on to a few dozen of my friends. This looks sweet, does it not? The subject line says Read more…
Tags: botnet, Consumer, counter identity theft, Cybercrime, easter, Family Safety, malware, McAfee Consumer Threat Alert, scam
Avoid clicking on links and images in malware-laden emails, McAfee warns Computer users around the world received phony Easter greetings with links to malware on Monday, according to research by McAfee Labs™. Cybercrooks often take advantage of current events to grab computer users’ attention, and this time they are using the upcoming Christian holiday to Read more…
Tags: botnet, Consumer, counter identity theft, Cybercrime, easter, Family Safety, malware, McAfee Consumer Threat Alert, scam
Cybercrooks always latch on to current events to lure unsuspecting Internet users into their traps. It doesn’t matter what type of event it is, a natural disaster, major sporting championship or, in today’s case, Easter, the upcoming Christian holiday. This morning I received an e-mail (see below) with a colorful picture of a bunny, some Read more…
Tags: botnet, Consumer, counter identity theft, Cybercrime, easter, Family Safety, malware, scam
There has been quite a bit of news recently about distributed denial of services (DDoS) attacks against a number of South Korean websites. About 40 sites– including the Presidential, National Intelligence Service, Foreign Ministry, Defense Ministry, and the National Assembly–were targeted over the weekend, beginning around March 4 at 10 a.m. Korean time. These assaults Read more…
Tags: botnet, critical infrastructure, Cybercrime, Data Protection, DDoS, Endpoint Protection, global threat intelligence, Infrastructure, malware, Network Security, Stinger, targeted attacks
Cybercrime is one of the most successful and lucrative industries of our time, growing by double digits year after year. Over the last decade, cyber crooks have developed new and sophisticated ways to prey on an explosion of Internet users, with little danger of being caught. Meanwhile, consumers face greater risks to their money and Read more…
Tags: $1 million guarantee, access to live fraud resolution agents, botnet, Charity Phishing Scams, counter identity theft, credit fraud alerts, cybersquatting, fake websites, identity protection $1 million guarantee, identity surveillance, identity theft expert, internet identity trading surveillance, lost wallet protection, McAfee Identity Protection, personal information protection, proactive identity protection, proactive identity surveillance, restore credit and personal identity, sniffing tools, type in website address incorrectly, typing in incorrect URLs, Unsecure websites, URL hijacking, verify website's legitimacy, work with victim restore identity
Looking at computer threats from quarter to quarter remains a busy experience for us at McAfee Labs. Through the first three quarters of the year we have analyzed and cataloged more threats than in all other years combined, and the growth in both volume and sophistication of malware and attacks shows no signs of slowing. Read more…
Tags: botnet, critical infrastructure, Cybercrime, data breach, Data Protection, Email & Web Security, encryption, Endpoint Protection, facebook, global threat intelligence, Hacktivism, malware, Mobile, Operation Aurora, phishing, privacy, seo abuse, social networking, social networks, spam, sql attacks, Stuxnet, twitter, vulnerability, Web 2.0, zeus
Posts tagged under botnet