We have seen malware that infects executables operate so that the malicious code runs first, and is then followed by the execution of host file. The malware XDocCrypt takes this a step further. Bes
Author: McAfee Labs
Black Hat is over. The year’s biggest and probably most influential IT security conference again had a lot of interesting talks to offer, and of course also the most important part: Meeting w
This is the third in a series of posts about Microsoft Windows 8, the Metro interface, and our view of its security status. To review the first two articles, click here and here. UEFI and Secure Bo
News broke today of a large data breach against Yahoo Voices, resulting in more than 400,000 username/password combinations being posted in clear text. The compromise involved a basic SQL-injection