How Working Together Accelerates Our Evolution
It is no secret that the end goal for cybersecurity companies is to battle cyber-threats & cyber-attackers in order keep their customers assets and data safe. Easy, right? Well, the problem is that defenders must move faster than the attackers, than the changes in the underlying technologies evolve, and faster than the power of tools […] more…
Best Security Practices for Dealing With the Internet of Things
The Internet of Things is growing fast. Intel sees the market for IP-connected hardware reaching 200 billion devices by the end of 2020. (See “A Guide to the Internet of Things” graphic, at the end of this post.) Given this widespread adoption, security should be a primary concern. The Dyn DDoS attack last year by […] more…
McAfee Labs Threats Report Explores Threat Intelligence Sharing and Mirai, the IoT Botnet
In the McAfee Labs Threats Report: April 2017, published today, we explore two key topics. Following an announcement by the Cyber Threat Alliance of its formal incorporation and the release of a threat intelligence sharing platform, we provide some perspective about threat intelligence sharing. The story provides a detailed analysis of the background and drivers of […] more…
TinyNuke May be a Ticking Time Bomb
On March 12th, 2017 a low-profile developer uploaded to Github a mostly functional Botnet code named TinyNuke. The user, Aainz, uses his real name in connection with this code. It’s not unusual for security professionals or hobbyist to release proof of concept code to enable the industry to learn from the latest techniques and test […] more…
Here Are Google’s Best Tips For Avoiding Android Ransomware
Reports of ransomware infecting Android devices are often sensational, yet according to Google, fewer than 0.00001% of app installs from Google Play have ever contained ransomware. You’re more likely to be struck by lightning twice, the company notes. Two common Android ransomware screens That’s not to say ransomware isn’t a very serious issue and […] more…
Remaining True in the Face of Incredible Responsibility
By now you’ve heard the news: Intel Security has officially rebranded to McAfee. But even though our company name has changed, our values and mission continue to endure: our focus remains on educating our customers through valuable content, collaboration within the industry to share intelligence, and leading in security initaitves and innovations. Ultimately, we’re dedicated […] more…
Help Us Celebrate #newMcAfee Re-Tweet to Win!
Today is a new day, and a new company: Intel Security has officially rebranded to McAfee, and because we’re so excited about this change, we’re using it as an excuse to give YOU the chance to win some prizes. The Details: With this new brand comes a new era of security, with the aim to […] more…
Day Two and Beyond
It’s not often we get a chance to work on something truly amazing. To be a part of something new. But this week marks one such occasion. It’s a re-invention of one of the industry’s best known names. For someone like me who’s been around a few years, this is a great opportunity to help […] more…
Distracted Driving: Is Your Life (or Someone Else’s) Worth that Text?
“We had talked about it and talked about it so many times, but she never thought anything like this would happen to her,” said the mom of 18-year-old Kassie. “She would say she was good enough at texting; that she was fast at it. But it doesn’t take that long—all it takes is a couple […] more…
The Threat Landscape Has Evolved. But McAfee Has Too.
There is no question that the threat landscape has evolved. Gone are the times of network worms and viruses that were simply an inconvenience. In today’s digital world, threats have become diverse, complex and adaptive. We’ve seen an army of botnets take the entire east coast offline, and we’ve even witnessed a billion personal email […] more…
What’s In a Name?
In one of the most iconic self-help books of all time, How to Win Friends and Influence People, Dale Carnegie outlines several strategies to earn favor from others. Among them is recognizing that a person’s name is, to that person, the sweetest sound in any language. I’ll posit a reason: Your name is your first […] more…
McAfee is Back – And Ready to Lead
Today we introduce a ‘new’ McAfee to the world. It’s the right move at the right time. Not only for us, but for the global cybersecurity industry. We have a clear roadmap to lead in innovation, and an opportunity to shape the marketplace as never before. The headlines we drive today span many dimensions. We […] more…
A data breach can put the reputation of enterprises at stake
Worldwide, organizations are concerned about cybercrime – but not necessarily for the reasons most would think. While many organizations worry about the technical issues that are posed by a cybercrime attack, such as ransomware locking up entire swaths of servers and bringing business operations to its knees, most are even more concerned about their public […] more…
How to Gain a Competitive Advantage with an Integrated Approach to Security
Simply adding an advanced threat analysis technology to your security stack can expand detection and solve some immediate security issues. But thinking beyond standalone detection to an integrated ecosystem can not only improve detection and protection throughout your organization, it can also enhance your business by optimizing security operations response time, giving you a competitive […] more…
Leveraging UEBA Capabilities in Your Existing SIEM
User and entity behavior analytics (UEBA) uses advanced analytics to track and flag suspicious behaviors of both users and assets, such as networked assets, sensors, databases, devices, and hosts. There are many reasons why UEBA is gaining traction as both an integrated tool with SIEM as well as a standalone solution. A few include: Increasing […] more…
A Quick Guide to ‘Zero-Day Threats’ and How They Affect You
If you’re looking for a cybersecurity term that sounds intimidating and impressive to those who aren’t familiar with the field, you’d be hard pressed to find a better phrase than “zero-day threat.” It’s catchy, it hints at clandestine activity, and it’s taken advantage of vulnerabilities found with the systems of a large health organization and […] more…
2017 Antivirus News | Powered by WordPress |
Fluxipress Theme
| Show My IP Address, check blacklists
| Free Favicon, Android and Apple Icon Generator
| Bitcoin and Crypto Currency News
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More Privacy & Cookies Policy