IoT Devices: The Gift that Keeps on Giving… to Hackers
McAfee Advanced Threat Research on Most Hackable Gifts You’ve probably noticed the recent increase in Internet connected drones, digital assistants, toys, appliances and other devices hitting the market and maybe even showing up in your own home. The sale of these “Internet-of-Things” (IoT) devices is expected to reach 600 million units this year[1] and, unfortunately, […] more…Supporting Our Military Veterans at McAfee
By Dawson McPherson, Talent & Communications Coordinator Over the past week, McAfee employees around the world paused to recognize and honor all the brave military men and women who have served their countries. From a veterans appreciation ceremony at our Plano, Texas office, to a display of red poppies in observation of Remembrance Day at […] more…The Future of Cyber Safety: Could Artificial Intelligence Be The Silver Bullet?
Stay Safe Online Week 2017 Cyber safety: outsourcing to experts makes such sense! Like most multi-tasking millennium mums, I’m a BIG fan of outsourcing: ironing, cleaning and gardening – it just makes such sense! Why not get an expert involved so you can focus on the things you love? Smart, I say! But did you […] more…The Kids are in Charge
This blog post was written by Ribu, Communications Manager based in Bangalore, India. Kids are wonderful, aren’t they? And what could be better than having a record-breaking 500 children liven up McAfee’s India Development Center on our annual Kids@Work Day. This annual gathering transforms our Bangalore site from an everyday office to a Wonderland. It […] more…Kim Dotcom faces extradition to the US
A New Zealand court ruled on Monday that internet entrepreneur Kim Dotcom could be extradited to the United States to face charges relating to his Megaupload website, which was shut down in 2012 following an FBI-ordered raid on his Auckland mansion. The Auckland High Court upheld the decision by a lower court in 2015 on […] more…Teaching Kids to Rise Above the Twitter Trolls
The social media platform Twitter has been making the headlines every day lately and not for good reasons. The popular 140-character driven network is under fire for its increasingly troll-heavy content and its failure to regulate abusive tweeters. From celebrities shutting down accounts to politicians and special interest groups daily (and very publically) engaged in […] more…Court told Dotcom case is ‘simple fraud’
After three and a half years, Kim Dotcom has faced court in New Zealand facing charges of copyright violation, racketeering, and money laundering, as well as potential extradition to the United States. more…Multiplatform Boleto Fraud Hits Users in Brazil
A study conducted around June last year revealed a malware-based fraud ring that infiltrated one of Brazil’s most popular payment methods – the Boleto Bancário, or simply the boleto. While the research and analysis was already published by RSA, we’ve recently discovered that this highly profitable fraud is still out in the wild and remains […] more…Hacktivist Group CyberBerkut Behind Attacks on German Official Websites
A pro-Russian group called CyberBerkut claimed responsibility for a recent hack on certain German government websites in early January. We were able to gather some information on some of its members based on Pastebin data that had been leaked by the Ukrainian nationalist political party (Pravy Sektor). A Background on CyberBerkut CyberBerkut is an organized group […] more…CUTWAIL Spambot Leads to UPATRE-DYRE Infection
A new spam attack disguised as invoice message notifications was recently seen spreading the UPATRE malware, that ultimately downloads its final payload- a BANKER malware related to the DYREZA/DYRE banking malware. Background In early October we observed a surge of spammed messages sent by the botnet CUTWAIL/PUSHDO, totaling to more than 18,000 messages seen in a single day. CUTWAIL/PUSHDO has been in […] more…Spam in May 2014
Spam in the spotlight In the run-up to the summer, spammers offered their potential customers seedlings and seeds for gardening. In addition, English-language festive spam in May was dedicated to Mother’s Day – the attackers sent out adverts offering flowers and candies. Holiday spam for Mom As usual, the spammers were very busy in the […] more…Twitter Drama and What Parents Need to Know
With more teens flocking to social networks outside of Facebook, it’s more important than ever for parents to understand—and coach their kids—through the rapid-moving, drama-filled environment of Twitter. Twitter has become a hot spot for teens, many of whom view Tweets the same way they view texts. They tweet quickly and often. And, sometimes things […] more…WordPress Security Presentation by Tony Perez
Tomorrow I will be flying to my hometown (Miami) to give a Website Security presentation to a bunch of enthusiastic online professionals at an event called WordCamp. If you’re not familiar with these events, they are global events put together by the local populace to focus on a specific platform – WordPress. The event is […] more…4 Ways to Protect Your Medical Information from Healthcare Fraud
Winter is upon us, and with it comes the dreaded flu season. In turn, this means more trips to the doctor’s office and the potential for high medical bills – a monetary incentive that fraudsters have not overlooked. According to the FBI, healthcare fraud costs the United States an estimated $80 billion a year, with […] more…Guard Against Sandbox-Bypassing Adobe Reader Zero-Day
News of the ‘unknown’ and underground zero-day in Adobe Reader is all over the place. Because of its supposed noteworthy features, including the capability to defeat Adobe’s sandbox feature, users are alarmed – and rightfully so. But the situation is not without hope. With this entry, my aim is to explain to our customers what […] more…Don’t Let Location-Based Services Put You in Danger
Location-based services utilize geo-location information to publish your whereabouts. In some cases, these services can also provide discounts or freebies as a reward for “checking in” at participating businesses and gathering “points.” These services can also be used to share photos and other media in real-time with your friends and followers. Geo-location or geo-tagging can […] more…More information
- Resolved: meeting.psu.edu Not Permitting Log In
- The Good, the Bad and the Ugly of Generative AI
- Meet the three North Korean hacking groups funding the country’s weapons programs
- DejaBlue: New BlueKeep-Style Bugs Mean You Need to Update Windows Now
- Windows 7 Most Hit by WannaCry Ransomware
- Amazon to Stop Accepting Flash Ads Due to Browser Limitations
- New SnailLoad Attack Relies on Network Latency Variations to Infer User Activity
- Why the CIA wanting encryption backdoors is a failure of leadership, not intelligence
- Mozilla suspends Firefox Send due to malware abuse
- Security expert hacks Hearthstone