Look beyond job boards to fill cybersecurity jobs
The cybersecurity talent shortage keeps getting worse. According to Cybersecurity Ventures, the cost of cybercrime will double from $3 trillion globally in 2015 to $6 trillion by 2021. Meanwhile, the number of open cybersecurity jobs will increase from 1 million in 2016 to 1.5 million by 2019. Meanwhile, the scale and damage of the attacks […] more…Coming #HomeToVote for Marriage Equality
Chris is a localization engineer for McAfee in Cork, Ireland, who is passionate about inclusivity for gender and sexual minorities in the workplace. As part of small group of citizens invited by the Irish Government to form the first Irish Constitutional Convention, he helped the effort for the referendum on equal rights in Ireland that […] more…Spam Campaign Delivers Cross-platform Remote Access Trojan Adwind
Cybercriminals are opportunists. As other operating systems (OS) are more widely used, they, too, would diversify their targets, tools, and techniques in order to cash in on more victims. That’s the value proposition of malware that can adapt and cross over different platforms. And when combined with a business model that can commercially peddle this […] more…SLocker Mobile Ransomware Starts Mimicking WannaCry
by Ford Qin Early last month, a new variant of mobile ransomware SLocker (detected by Trend Micro as ANDROIDOS_SLOCKER.OPST) was detected, copying the GUI of the now-infamous WannaCry. The SLocker family is one of the oldest mobile lock screen and file-encrypting ransomware and used to impersonate law enforcement agencies to convince victims to pay their […] more…7 Strategies to Help Kids Sidestep Digital Friction this Summer
What happens when you mix long summer days with a steady flow of SnapChats, tweets, Instagram feeds, and a non-stop hum of group texts streaming into your life? If you’re an adult, you’ve likely learned how to power off and unplug for a few hours or days when you’ve hit digital overload. If you are […] more…Petya More Effective at Destruction Than as Ransomware
At the beginning of the recent Petya malware campaign, the world was quick to exclaim this attack was ransomware. Now, with time to analyze the facts and make comparisons to other ransomware campaigns, this Petya attack does not look so much like ransomware. To back up this claim, let’s examine three other well-known ransomware campaigns: […] more…Cyberattacks and Financial Services: Good News, Bad News
As highlighted in the Verizon 2017 Data Breach Investigations Report, the financial services sector continues to be a target of cyberattacks. That said, the trend has also shifted to other verticals, such as healthcare with the recent WannaCry attack and other hospital data breaches. One hopes, as the report suggests, that banks’ significant investments have […] more…Beer + bitter former field engineer = hacked smart water meters
The story of Adam Flanagan, who’s been jailed for hacking, is a reminder to companies to revoke access to networks when they sack a disgruntled employee more…It’s time to upgrade to TLS 1.3 already, says CDN engineer
Businesses dragging their heels over rolling out TLS 1.2 on their website might have an excuse to delay a little longer: Version 1.3 of the TLS (Transport Layer Security) encryption protocol will be finalized later this year, and early deployments of it are already under way. TLS, the successor to SSL, is used to negotiate […] more…Can you see me now? Unpacking malware for advanced threat analysis.
A recent McAfee blog ‘Malware Packers Use Tricks to Avoid Analysis, Detection’, highlighted the use of packers as an effective way to slow down analysis and decrease detection by antimalware products. As an engineer with a keen interest in malware, I’m very familiar with packers and the conclusion from that blog that ‘manual analysis usually […] more…Migration to McAfee Endpoint Security “Like Moving from a VW Bug to an Aston Martin”
Norbert Marx, a senior security engineer at Accarda, a Swiss provider of customer loyalty cards and other payment-related services, has become an evangelist of sorts for McAfee Endpoint Security (ENS) ever since his company migrated to it. “What are you waiting for?” says Marx. “McAfee ENS protects better, is easier to use, and saves time. […] more…Show me the money – Financial Services Need to Rethink Security
Financial institutions are under attack. As gatekeepers to consumers’ and enterprises’ most personal and private information, this industry serves as one of the most lucrative avenues for cybercriminals to pursue. In response, financial services organizations have developed unsustainable security infrastructures that are characterized by a huge proliferation of tools to address “the next big thing” […] more…An Unmatched Customer Experience
I’ve been in this industry for over twenty years, and the advancements in cybersecurity over the last few years are unmatched. As an industry, we went from believing in a best-in-breed, siloed approach and now we understand our customers need a connected security architecture that can protect, detect, and correct. While we’ve made impressive advancements, […] more…What it takes to be a security incident responder
Cyber security response teams are keeping busy these days, with an abundance of hacking and other attacks launched against organizations on a regular basis. The professionals who make up these teams are skilled in evaluating and responding to such attacks in a timely manner and can minimize damage for organizations. “The demand for cyber security […] more…AdGholas Malvertising Campaign Employs Astrum Exploit Kit
At the end of April this year, we found Astrum exploit kit employing Diffie-Hellman key exchange to prevent monitoring tools and researchers from replaying their traffic. As AdGholas started to push the exploit, we saw another evolution: Astrum using HTTPS to further obscure their malicious traffic. We spotted a new AdGholas malvertising campaign using the […] more…Is That Photo Containing a Cyberthreat? What to Know About Steganographic Malware
Secret messages are hidden everywhere – within a hit song, a brand logo, a big blockbuster movie. Usually, these messages are fun Easter eggs or nods to fans. In the digital world, this kind of practice is called steganography, and messages are usually concealed in images, audio tracks, video clips, or text files. But, instead […] more…More information
- T-Mobile Settles to Pay $350M to Customers in Data Breach
- Linux fatware? These distros need to slim down
- Firms That Promised High-Tech Ransomware Solutions Almost Always Just Pay the Hackers
- Researcher hides stealthy malware inside legitimate digitally signed files
- NSA: We Are Heavily Biased Toward Defense
- AttackIQ Raises $17.6 Million in Series B Funding Round
- Industrial Cybersecurity Firm Nozomi Networks Raises $7.5 Million
- MWC: When it comes to 6G, Apple is a leader, not a follower
- Exim CVE-2019-15846 Arbitrary Code Execution Vulnerability
- Protecting the perimeter with VT Intelligence – malicious URLs