TrustedSource™ is ...
... the industry's most complete Internet reputation system.
>>More
 

TrustedSource™ Query
Enter IP address, domain name or URL to check reputation/traffic patterns:
 

Login
Login/Create Account to to have member access to all TrustedSource.org features.

Login Name
Password
Forgotten your password?
Create Account
 

Spotlight
Customer URL Ticketing System
Check and track URL categorizations. More

McAfee Research Blog
Read more about the latest security issues, trends and threats. More
 

McAfee Research Blog

Product Coverage and Mitigation for CVE-2013-3893

September 20th, 2013
Posted by Jim Walter

Microsoft Security Advisory (2887505) On September 17th, 2013, Microsoft published Security Advisory 2887505, which coverers a remote code execution vulnerability in all supported versions of Microsoft Internet Explorer.   The flaw resides in the handling of objects in memory which have been deleted or improperly allocated.  Specifically, a use-after-free flaw in the HTML rendering engine (aka Read more...    More

Vertexnet Botnet Hides Behind AutoIt

September 19th, 2013
Posted by Hardik Shah

Recently we found some new malware samples using AutoIt to hide themselves. On further analysis we found that those sample belong to the Vertexnet botnet. They use multiple layers of obfuscation; once decoded, they connect to a control server to accept commands and transfer stolen data. This sample is packed using a custom packer. On Read more...    More

Andromeda Botnet Hides Behind AutoIt

September 12nd, 2013
Posted by Umesh Wanve

Last month, I posted a blog about an increase in the use of AutoIt scripts by malware authors to carry out malicious activities. Attackers have used AutoIt scripts for a long time, and they are gaining in popularity due to their flexible and powerful nature. We have now come across another piece of malware (which Read more...    More