Quantcast
Channel: Blog Central » Operation Aurora
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

FOCUS 10: Predictive Detection to Cyberterrorism

McAfee just hosted its third FOCUS security conference in Las Vegas. I greatly enjoyed the 2008 and 2009 events, and I’ve just returned from the 2010 conference. Of course, I did not miss the keynotes...

View Article



Malware Rises, Zeus Goes Mobile, Stuxnet Confuses in Recent Quarter

Looking at computer threats from quarter to quarter remains a busy experience for us at McAfee Labs. Through the first three quarters of the year we have analyzed and cataloged more threats than in all...

View Article

Cybercrime, Hacktivism, Cyberterrorism Hot Topics at McAfee’s Focus10

Yesterday I presented on Cybercrime, Hacktivism and Cyberterrorism with one of McAfee Labs’ most senior and well respected researchers, Francois Paget. This was a very different session in a number of...

View Article

Moving Forward, Looking Back

The New Year is already in full swing and as always, we at McAfee are working hard to anticipate and prepare our customers for potential threats. The year 2010 had many major cybersecurity incidents,...

View Article

Image may be NSFW.
Clik here to view.

Global Energy Industry Hit In “Night Dragon” Attacks by George Kurtz

In 2010 McAfee Labs processed an average of almost 55,000 pieces of new malware every day. That nearly mind-numbing amount makes it difficult for any particular attack to stand out. Today, however, I...

View Article


Industry-Government Collaboration: Our Best Defense

I had the privilege of speaking before the House Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies at a hearing titled “Examining the Cyber Threat to Critical...

View Article

Defense In Depth: Protecting From The Inside Out

Something Changed With Aurora Even before the China centered Operation Aurora attack (a.k.a. Google attacks) in which hackers broke into numerous high-profile organizations in the US to steal highly...

View Article

Google Disclosure Spotlights Phishing Scams

Google’s unusual disclosure on Wednesday that e-mail accounts of prominent Gmail users had been compromised puts the spotlight on a very common online scam: phishing scams. Phishing is a way of...

View Article


Image may be NSFW.
Clik here to view.

Lockheed Martin, EMC, Sony: Design Inner Security Layer assuming Outer Layer...

The recent security breach at Lockheed Martin confirmed that the attacks we saw with Operation Aurora, identified by McAfee, and Stuxnet are just the beginning of a new era of targeted attacks....

View Article


The New Reality of Stealth Crimeware

Anyone who has been in information security recently knows that it has gotten easier for cybercriminals to build stealth crimeware. The malware we deal with on a regular basis grows ever more difficult...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images