How to Secure the Future of the Internet of Things
The world of security for the Internet of Things just became more complex. IoT devices are no longer a potential threat to their owners; now they pose a significant threat to everything connected to the Internet. The old IoT security problem For the past year, the cybersecurity and IoT communities have been at odds regarding […] more…Can Internet of Things be the New Frontier for Cyber Extortion?
The Internet of Things (IoT)—the network of devices embedded with capabilities to collect and exchange information—has long been attracting the attention of cybercriminals as it continues to gain momentum in terms of its adoption. Gartner has estimated that more than 20.8 billion IoT devices will be in use by 2020; IoT will be leveraged by […] more…ATMZombie: banking trojan in Israeli waters
On November 2015, Kaspersky Lab researchers identified ATMZombie, a banking Trojan that is considered to be the first malware to ever steal money from Israeli banks. It uses insidious injection and other sophisticated and stealthy methods. The first method, dubbed “proxy-changing”, is commonly used for HTTP packets inspections. It involves modifying browser proxy configurations and […] more…Crypto-Ransomware Sightings and Trends for 1Q 2015
It seems that cybercriminals have yet to tire of creating crypto-ransomware malware. Since the start of 2015, we have spotted several variants of crypto-ransomware plague the threat landscape. In January, the Australia-New Zealand region was beset by variants of TorrentLocker. But we soon discovered that TorrentLocker infections were not limited to that region; Turkey, Italy, […] more…Paying For Content
I remember setting up our first website. That was 20 years ago, in 1994. When the Web was very young and there were only a handful of websites, it was easy to forecast that the Web was going to grow. And indeed, during these past 20 years, it has exploded in size. What’s even more […] more…Understanding the WordPress Security Plugin Ecosystem
As a child, did you ever play that game where you sit in a circle and one person is responsible for whispering something into one persons ear, and that message gets relayed around the circle? Wasn’t it always funny to see what the final message received would be? Oh and how it would have morphed […] more…McAfee Online Safety for Kids recognized as a 2013 Computerworld Honors Laureate
I am STOKED that IDG’s Computerworld Honors Program today recognized the McAfee Cares – Online Safety for Kids program as a 2013 Laureate. The annual award program honors visionary applications of information technology promoting positive social, economic and educational change. The Computerworld Honors Program awards will be presented at the Gala Evening and Awards Ceremony on […] more…Don’t Let Location-Based Services Put You in Danger
Location-based services utilize geo-location information to publish your whereabouts. In some cases, these services can also provide discounts or freebies as a reward for “checking in” at participating businesses and gathering “points.” These services can also be used to share photos and other media in real-time with your friends and followers. Geo-location or geo-tagging can […] more…More information
- How to selectively delete browser history
- Google Patches Nexus 6 Secure Boot Bypass
- Big Hangover
- European commissioner demands Prism answers from US attorney general
- Comprehensive Advanced Threat Defense
- CISA Adds 66 Vulnerabilities to ‘Must Patch’ List
- Naked Security Podcast – we’re back for Series 3!
- South Korea punishes three credit card firms over data heist
- Breach Detection Time Improves, Destructive Attacks Rise: FireEye
- What every CSO should be doing now about the Starbucks potential hack