Back to Results
First PageMeta Content
Computer security / Cyberwarfare / McAfee SiteAdvisor / Malware / Blended threat / Threat / Operation Aurora / McAfee / Antivirus software / Software


Solution Brief Abuse of Trust Preying upon those who trust. The adage “trust is earned, not given” rings true; we have all seen examples of
Add to Reading List

Document Date: 2014-12-05 18:25:30


Open Document

File Size: 569,96 KB

Share Result on Facebook

Company

McAfee SiteAdvisor Enterprise / Adobe / Trend Micro / McAfee Inc. / Zedo / Google / McAfee Labs / Intel Corporation / /

Country

United States / /

Event

Funding / /

Facility

Google Play Store / /

IndustryTerm

copycat applications / near real time / advertising networks / software stack / malicious ad networks / ad network / web traffic / knockoff applications / security technology / whitelisted applications / counterfeit products / real time / wireless operations / legitimate applications / security products / malicious advertising networks / network-connected device / online world / standalone product / asset management / copycat malware-bearing applications / web categorization feeds / network software trust / whitelist automatically as systems / open-source software / endpoint protection technology / web reputation / real-time feeds / online users / /

Organization

Certificate Authority / McAfee Global Threat Intelligence / /

Person

McAfee / Stan / Kyle / /

Position

Editor / Manager work / Manager Attacks / Vulnerability Manager / Asset Manager / /

Technology

security technology / Operating system / mobile device / digital signature / SSL / operating systems / endpoint protection technology / Flash / /

URL

www.intelsecurity.com / /

SocialTag