<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VR World &#187; McAfee</title>
	<atom:link href="http://www.vrworld.com/tag/mcafee/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.vrworld.com</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 07:54:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>What McAfee Has to Say About Japan&#8217;s Mobile Security Problem</title>
		<link>http://www.vrworld.com/2014/12/10/mcafee-say-japans-mobile-security-problem/</link>
		<comments>http://www.vrworld.com/2014/12/10/mcafee-say-japans-mobile-security-problem/#comments</comments>
		<pubDate>Wed, 10 Dec 2014 08:14:00 +0000</pubDate>
		<dc:creator><![CDATA[Christian Crisostomo]]></dc:creator>
				<category><![CDATA[Japan]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[mobile phone]]></category>
		<category><![CDATA[mobile security]]></category>
		<category><![CDATA[scam call]]></category>
		<category><![CDATA[spam call]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=40965</guid>
		<description><![CDATA[<p>Japan incurred huge financial losses due to phone security issues this year. What does McAfee has to say about this?</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/12/10/mcafee-say-japans-mobile-security-problem/">What McAfee Has to Say About Japan&#8217;s Mobile Security Problem</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="600" height="450" src="http://cdn.vrworld.com/wp-content/uploads/2014/12/mcafeeascii.jpg" class="attachment-post-thumbnail wp-post-image" alt="mcafeeascii" /></p><p>A total of 45 billion yen &#8212; equivalent to about $380 million &#8212; were the total financial losses incurred from January to October this year due to spam and scam phone calls in Japan. The prevalance of smartphones in the country may have made communication more accessible than ever, but with it comes the increased risk in security.</p>
<p>McAfee Japan, planning to turn over the situation, has decided to actively improve mobile security <a href="http://weekly.ascii.jp/elem/000/000/280/280477/">with the development</a> of a new Android app, the <a href="http://www.mcafee.com/japan/home/pd/safe_call/">McAfee Safe Call</a>.  Co-developed by local IT firm Tobila Systems, the new app provides a security check to phone calls, much in the same way as how anti-virus software checks files and data for malicious content. The app automatically identifies any caller, and by matching it to a constantly updating cloud database, determines if that caller&#8217;s number is safe or not.</p>
<p>As explained by McAfee <a href="http://www.itmedia.co.jp/mobile/articles/1412/03/news152.html">during an introduction seminar held last week</a>, the McAfee Safe Call uses four basic notification modes, all of which help the user determine the level of risk a phone call may have. The safest green level determines that the number calling is properly listed in Tobila Systems&#8217; safe database, as well as being listed on the user&#8217;s phonebook. A yellow alert notification checks that the number calling is listed in the database as a spam call number, and appropriately warns the user with it. Red notifications show blacklisted scam/fraudulent numbers, while a gray notification indicates an unknown/undetermined number which is either not yet in the database, on a public line, or is an international call.</p>
<p>McAfee touts that the complex yet convenient integration of the system is the key to make the app work as advertised. Tobila Systems explains that data won&#8217;t just be collected, but it will also be rechecked and cross-referenced to make sure that the numbers are actually spam and scam numbers. More importantly, McAfee promises that the app would not only provide security from spam and scam numbers, but also provide security in the form of privacy. Any additional personal data on the mobile device that the app would use will require the user&#8217;s permission before it is sent to the cloud database.</p>
<p>Though McAfee and Tobila Systems are confident in the implementation of the new security app, both companies admit that there are still a few gaping hurdles that prevent it from becoming a universal solution. Developing the same system for Apple devices might prove quite difficult for instance, because no API for developing apps for (carrier) phone calls is currently available for iOS at the moment. Also, the app is only optimized for carrier calls, and is not designed for VoIP systems, the apps of which are gaining steady popularity in smartphones today.</p>
<p>Nevertheless, McAfee is keen on using its McAfee Safe Call app to further bolster Japan&#8217;s mobile security, as its successful implementation could really help significantly mitigate financial losses.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/12/10/mcafee-say-japans-mobile-security-problem/">What McAfee Has to Say About Japan&#8217;s Mobile Security Problem</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/12/10/mcafee-say-japans-mobile-security-problem/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Regin: Stuxnet&#039;s Best Spying Malware Cousin</title>
		<link>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin/</link>
		<comments>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin/#comments</comments>
		<pubDate>Tue, 25 Nov 2014 00:21:36 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Backdoor.Regin]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[GSM]]></category>
		<category><![CDATA[ISP]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[Regin]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Spy]]></category>
		<category><![CDATA[Symantec]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=42133</guid>
		<description><![CDATA[<p>Regin is a new type of sophisticated malware that deeply embeds itself within a country, company or organization for the purpose of espionage.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin/">Regin: Stuxnet&#039;s Best Spying Malware Cousin</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1280" height="800" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-two.png" class="attachment-post-thumbnail wp-post-image" alt="Regin Graph Kaspersky" /></p><ol>
<li class="mod">
<div class="_oDd _YXc" data-hveid="31">
<div class="_Tgc"><b>Regin</b>. /ˈreɪɡɪn/ 1. (Norse myth) a dwarf smith, tutor of Sigurd, whom he encouraged to kill Fafnir for the gold he guarded.</div>
</div>
</li>
</ol>
<p>Regin is essentially a murderous dwarf who is caught/killed by his own greed. This Norse mythology is at the core a description of the Regin virus that has injected itself across the globe and today has finally been brought to light by Symantec and Kaspersky researchers. The Regin cybvervirus is a virus that has been tracked over the course of the past few years by security firms like Symantec, Kaspersky and McAfee, but they simply did not have enough data to build the whole picture of the computer virus&#8217; scope nor its target. As a result, this research has been going on for quite some time and today multiple security companies have published their findings on the Regin malware and what it seeks to accomplish once it has infected a system.</p>
<p><img class="aligncenter size-full wp-image-42138" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Sectors.png" alt="Sectors" width="380" height="327" /></p>
<p>According to <a href="http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance" target="_blank">Symantec&#8217;s research</a>, Regin is being used as a covert espionage tool to go after very specific targets and infect them at a very deep level to either gain access to information or to gain access to a user of that network&#8217;s information. They say that Regin is a very complicated and highly encrypted piece of malware that hides its final form from anyone looking to find it unless they have access to all five stages of the malware&#8217;s unpacking. They detail the process <a href="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/regin-analysis.pdf" target="_blank">in their technical whitepaper</a> but it is essentially a multi-stage virus that hides its ultimate target and execution unless users can obtain every form/stage of the virus&#8217; unpacking until it becomes the final payload.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-three.png" rel="lightbox-0"><img class="aligncenter size-full wp-image-42136" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-three.png" alt="Regin-graph-three" width="1671" height="858" /></a></p>
<p>This multi-stage approach is similar to what was seen from Duqu and Stuxnet and is once again very likely to be a sovereign-built piece of malware from some government. And as you can see, the targets that it goes after are very broad and appear to be focused mostly developing countries with Russia, Belgium and Germany being the exceptions. Those countries according to Kaspersky are:</p>
<p>Algeria<br />
Afghanistan<br />
Belgium<br />
Brazil<br />
Fiji<br />
Germany<br />
Iran<br />
India<br />
Indonesia<br />
Kiribati<br />
Malaysia<br />
Pakistan<br />
Russia<br />
Syria</p>
<p>However, if you use Symantec&#8217;s data, the list of countries actually expands to include Saudi Arabia, Austria, Ireland and Mexico.</p>
<div id="attachment_42134" style="width: 454px" class="wp-caption aligncenter"><a href="http://cdn.vrworld.com/wp-content/uploads/2014/11/Countries.png" rel="lightbox-1"><img class="size-full wp-image-42134" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Countries.png" alt="Regin Countries" width="444" height="366" /></a><p class="wp-caption-text">Regin Countries</p></div>
<p>Additionally, <a href="http://securelist.com/blog/research/67741/regin-nation-state-ownage-of-gsm-networks/" target="_blank">Kaspersky discovered</a> a strong attack on GSM networks, especially in the case of Belgium where an entire operator was infiltrated by this malware and had publicly announced that they had been attacked, but were not aware of the perpetrator nor the target. What&#8217;s interesting, however, is that both Kaspersky and Symantec had discovered that this malware&#8217;s structure and payload delivery system (the mutli-stage approach) were specifically designed to obscure the malware&#8217;s existence and once it had infected a system it was designed to be inconspicuous as it continued to linger on the infected system, making detection incredibly difficult.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin/">Regin: Stuxnet&#039;s Best Spying Malware Cousin</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Regin: Stuxnet&#039;s Best Spying Malware Cousin</title>
		<link>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin-2/</link>
		<comments>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin-2/#comments</comments>
		<pubDate>Tue, 25 Nov 2014 00:21:36 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Backdoor.Regin]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[GSM]]></category>
		<category><![CDATA[ISP]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[Regin]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Spy]]></category>
		<category><![CDATA[Symantec]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=42133</guid>
		<description><![CDATA[<p>Regin is a new type of sophisticated malware that deeply embeds itself within a country, company or organization for the purpose of espionage.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin-2/">Regin: Stuxnet&#039;s Best Spying Malware Cousin</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1280" height="800" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-two.png" class="attachment-post-thumbnail wp-post-image" alt="Regin Graph Kaspersky" /></p><ol>
<li class="mod">
<div class="_oDd _YXc" data-hveid="31">
<div class="_Tgc"><b>Regin</b>. /ˈreɪɡɪn/ 1. (Norse myth) a dwarf smith, tutor of Sigurd, whom he encouraged to kill Fafnir for the gold he guarded.</div>
</div>
</li>
</ol>
<p>Regin is essentially a murderous dwarf who is caught/killed by his own greed. This Norse mythology is at the core a description of the Regin virus that has injected itself across the globe and today has finally been brought to light by Symantec and Kaspersky researchers. The Regin cybvervirus is a virus that has been tracked over the course of the past few years by security firms like Symantec, Kaspersky and McAfee, but they simply did not have enough data to build the whole picture of the computer virus&#8217; scope nor its target. As a result, this research has been going on for quite some time and today multiple security companies have published their findings on the Regin malware and what it seeks to accomplish once it has infected a system.</p>
<p><img class="aligncenter size-full wp-image-42138" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Sectors.png" alt="Sectors" width="380" height="327" /></p>
<p>According to <a href="http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance" target="_blank">Symantec&#8217;s research</a>, Regin is being used as a covert espionage tool to go after very specific targets and infect them at a very deep level to either gain access to information or to gain access to a user of that network&#8217;s information. They say that Regin is a very complicated and highly encrypted piece of malware that hides its final form from anyone looking to find it unless they have access to all five stages of the malware&#8217;s unpacking. They detail the process <a href="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/regin-analysis.pdf" target="_blank">in their technical whitepaper</a> but it is essentially a multi-stage virus that hides its ultimate target and execution unless users can obtain every form/stage of the virus&#8217; unpacking until it becomes the final payload.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-three.png" rel="lightbox-0"><img class="aligncenter size-full wp-image-42136" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-three.png" alt="Regin-graph-three" width="1671" height="858" /></a></p>
<p>This multi-stage approach is similar to what was seen from Duqu and Stuxnet and is once again very likely to be a sovereign-built piece of malware from some government. And as you can see, the targets that it goes after are very broad and appear to be focused mostly developing countries with Russia, Belgium and Germany being the exceptions. Those countries according to Kaspersky are:</p>
<p>Algeria<br />
Afghanistan<br />
Belgium<br />
Brazil<br />
Fiji<br />
Germany<br />
Iran<br />
India<br />
Indonesia<br />
Kiribati<br />
Malaysia<br />
Pakistan<br />
Russia<br />
Syria</p>
<p>However, if you use Symantec&#8217;s data, the list of countries actually expands to include Saudi Arabia, Austria, Ireland and Mexico.</p>
<div id="attachment_42134" style="width: 454px" class="wp-caption aligncenter"><a href="http://cdn.vrworld.com/wp-content/uploads/2014/11/Countries.png" rel="lightbox-1"><img class="size-full wp-image-42134" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Countries.png" alt="Regin Countries" width="444" height="366" /></a><p class="wp-caption-text">Regin Countries</p></div>
<p>Additionally, <a href="http://securelist.com/blog/research/67741/regin-nation-state-ownage-of-gsm-networks/" target="_blank">Kaspersky discovered</a> a strong attack on GSM networks, especially in the case of Belgium where an entire operator was infiltrated by this malware and had publicly announced that they had been attacked, but were not aware of the perpetrator nor the target. What&#8217;s interesting, however, is that both Kaspersky and Symantec had discovered that this malware&#8217;s structure and payload delivery system (the mutli-stage approach) were specifically designed to obscure the malware&#8217;s existence and once it had infected a system it was designed to be inconspicuous as it continued to linger on the infected system, making detection incredibly difficult.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin-2/">Regin: Stuxnet&#039;s Best Spying Malware Cousin</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Content Delivery Network via Amazon Web Services: CloudFront: cdn.vrworld.com

 Served from: www.vrworld.com @ 2015-04-10 22:29:03 by W3 Total Cache -->