Aggregator
VENOM漏洞分析与利用
Slave Malware Analysis: Evolving From IBAN Swaps to Persistent Webinjects
iOS 内核堆利用技术点之 mach_msg ool
An Overview of Exploit Packs (Update 25) May 2015
TICSA turns one
11 May 2015 marks one year since the network security provisions of the Telecommunications (Interception Capability and Security) Act 2013 came into effect.
Windows Kernel Exploitation Humla by Ashfaq Ansari
VBKlip Banking Trojan Goes Man-in-the-Browser
Dyre In-Depth: Server-Side Webinjects, I2P Evasion, and Sophisticated Encryption
Kiosk/POS Breakout Keys in Windows
British Airways Frequent Flyers Report Stolen Air Miles
Frequent flyers, beware. Tens of thousands of accounts may have been compromised due to an automated attack against British Airways,...
The post British Airways Frequent Flyers Report Stolen Air Miles appeared first on McAfee Blog.
Google Brings Safe Browsing to the Masses With Its Safe Browsing API
The best way to protect yourself from the malicious programs (often called malware) hidden across the Internet, is to have...
The post Google Brings Safe Browsing to the Masses With Its Safe Browsing API appeared first on McAfee Blog.
‘Banking’ Malware Dridex Arrives via Phishing Email
Microsoft Office scripting malware has become more and more common and aggressive lately as malware authors constantly develop new techniques...
The post ‘Banking’ Malware Dridex Arrives via Phishing Email appeared first on McAfee Blog.
在非越狱设备上使用 LLDB 调试第三方 App
Office 365 Ascent Is Security Opportunity
Microsoft is on a roll with its cloud strategy. In the past two quarters, the software giant has posted triple-digit...
The post Office 365 Ascent Is Security Opportunity appeared first on McAfee Blog.
Ask and you shall receive
Speech to the Institute of Directors Breakfast by Ian Fletcher
Speech to the Institute of Directors Breakfast by Ian Fletcher, Director, Government Communications Security Bureau