Here’s How to Steer Clear of Bot Accounts on Social Media
“Congratulations, you’re a winner!” “Did you know this public figure is trying to make your life worse? Click here for what they don’t want you to know.” “Save thousands today with just one click!” Spam and bot accounts on social media are everywhere. You’ve likely encountered messages like these that attempt to get you to […] more…Threat Hunting with VirusTotal
We recently conducted our first “Hunting with VirusTotal” open training session, providing some ideas on how to use VT Intelligence to hunt for in-the-wild examples of modern malware and infamous APT campaigns. In case you missed it, here you can find the video recording available on Brighttalk. We also created a PDF version of the […] more…Don’t Stop Learning! Jeremy’s McAfee Journey
Our How I Got Here series spotlights the stories of team members who have successfully grown their careers here at McAfee. This journey features Jeremy whose passion for learning has seen him grow his career in our Technology Services Team. My McAfee career journey In 2015, I started as a contract worker to help manage network cabling […] more…Spam and phishing in Q3 2021
Quarterly highlights Scamming championship: sports-related fraud This summer and early fall saw some major international sporting events. The delayed Euro 2020 soccer tournament was held in June and July, followed by the equally delayed Tokyo Olympics in August. Q3 2021 also featured several F1 Grand Prix races. There was no way that cybercriminals and profiteers could […] more…Consumers want a fully connected life – but at what cost?
Convenience has always, and will always be king. That’s why it’s no surprise that the average person is collecting connected devices left and right and is expected to own 15 connected devices by 2030. While they vary from person to person, recent research shows that the most popular connected devices tend to be smart meters, […] more…Timeless Principles to Help Your Child Develop Social Superpowers
“You can make more friends in two months by becoming interested in other people than you can in two years by trying to get other people interested in you.” ~ Dale Carnegie Each year it’s my tradition to re-read a handful of books that continue to shape my perspective. One of those books is the […] more…Are Your Online Mainframes Exposing You to Business Process Compromise?
by Roel Reyes (Senior Threat Researcher) Legacy mainframes are still used by enterprises to handle big data transactions across a range of industries, from financial institutions, telecoms, and internet service providers (ISPs) to airlines and government agencies. Why are they still in use? As the saying goes: “if it ain’t broke, don’t fix it”. But […] more…More information
- Russia extends Edward Snowden’s asylum for three more years
- Resolved: Known Issue Impacting ANGEL Import and Export Tools: Investigation Underway
- Leveraging adversarial data for security control validation
- Investors accuse FedEx of lying, stock dumping after NotPetya attack
- Criminals hide child abuse images behind legal porn sites
- Trial Begins for Ex-CIA Worker Charged With Leaking Secrets
- Operation Indiscriminately Infects iPhones With Spyware
- Russia Detains Nine ‘Hackers’ Over $17 Million Bank Thefts
- Olympics Can’t Hire Enough Actual Security, But Fully Staffed With ‘Brand Police’
- Patch time! Adobe issues unexpected ‘critical’ fix for Photoshop CC