Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP network pattern generated contains a few interesting parameters,
Author: McAfee Labs
In the McAfee Labs blog we have covered many techniques that malware uses to evade code-based detection. In my previous blog I discussed procedure prologue and procedure epilogue techniques to evad
As the most popular mobile platform, Android has grown exponentially in recent years, increasing the market for new developers to show their skills with novel applications. However, not all develop
During the last two years we have observed the accelerated discovery of Android malware by the security industry. Malware authors today often create and distribute fake “antimalware” ap