* The Origins of Social Engineering by Hiep Dang
The growth in broadband penetration has led to an increase in country-specific malware attacks.
* Ask and You Will Receive by Karthik Raman
The psychology of social engineering: Why does it work?
* Social Engineering 2.0: What’s Next by Markus Jakobsson
Click fraud appears one of the most likely threats that we’ll face in the near future.
* The Beijing Olympics: Prime Target for Social Engineering Malware by Elodie Grandjean
The five rings, and other major events, are an irresistible attraction for malware authors.
* Vulnerabilities in the Equities Markets by Anthony Bettini
Can hackers make money from Patch Tuesday and other company news?
* The Future of Social Networking Sites by Craig Schmugar
Lots of money and users make social sites another magnet for malware.
* The Changing Face of Vulnerabilities by Rahul Kashyap
Social engineering tricks can lead users into holes in software.
* Typosquatting: Unintended Adventures in Browsing by Benjamin Edelman
Incautious web browsing can lead to the unexpected.
* Whatever Happened to Adware and Spyware? by Aditya Kapoor
Tougher laws may have tamed adware, but PUPs and Trojans remain.
* Statistics How risky are top-level domains? By David Marcus
Code: Select all
http://www.mcafee.com/us/research/mcafee_security_journal/index.html
What Has Led to This Explosive Growth?
A Look Ahead at 2009
Threats Hide in the Cloud
Personalized Threats Speak Your Language
Malware Revisited: Partying Like It’s 1999
The Rogue Web and Malvertising
McColo: The Effects of a Takedown
Code: Select all
http://www.mcafee.com/us/local_content/reports/2009_threat_predictions_report.pdf