IoT Devices: The Gift that Keeps on Giving… to Hackers
McAfee Advanced Threat Research on Most Hackable Gifts You’ve probably noticed the recent increase in Internet connected drones, digital assistants, toys, appliances and other devices hitting the market and maybe even showing up in your own home. The sale of these “Internet-of-Things” (IoT) devices is expected to reach 600 million units this year[1] and, unfortunately, […] more…Supporting Our Military Veterans at McAfee
By Dawson McPherson, Talent & Communications Coordinator Over the past week, McAfee employees around the world paused to recognize and honor all the brave military men and women who have served their countries. From a veterans appreciation ceremony at our Plano, Texas office, to a display of red poppies in observation of Remembrance Day at […] more…#WorldKindnessDay: How to Help Kids Tap into their Superpower of Being Kind
“There is no small act of kindness. Every compassionate act makes large the world.” —Mary Anne Radmacher, American writer, and artist With so many tragedies in the news, World Kindness Day, Nov. 13, could not come at a better time. But can one day — or month — put a dent in the accumulation […] more…Why Social Engineering is a Scammer’s Secret Weapon
Criminals and scammers love to trick, deceive and manipulate their victims into handing over sensitive information, and money. This kind of exploitation is often referred to as social engineering, and it’s worth knowing about because although the scams change, the methods remain the same. Social engineering can happen online, over the phone, or even in […] more…The Top 5 Scariest Mobile Threats
Halloween has to be one of my favorite holidays of the year. Creative costumes, buckets of candy, and pumpkin spice lattes make All Hallows’ Eve a memorable event for people of all ages. But what I love most about Halloween is the traditions associated with it: pumpkin carving, trick or treating and bobbing for apples […] more…Dnsmasq: A Reality Check and Remediation Practices
Dnsmasq is the de-facto tool for meeting the DNS/DHCP requirements of small servers and embedded devices. Recently, Google Security researchers identified seven vulnerabilities that can allow a remote attacker to execute code on, leak information from, or crash a device running a Dnsmasq version earlier than 2.78, if configured with certain options. Based on Censys and Shodan data, […] more…The Future of Cyber Safety: Could Artificial Intelligence Be The Silver Bullet?
Stay Safe Online Week 2017 Cyber safety: outsourcing to experts makes such sense! Like most multi-tasking millennium mums, I’m a BIG fan of outsourcing: ironing, cleaning and gardening – it just makes such sense! Why not get an expert involved so you can focus on the things you love? Smart, I say! But did you […] more…To Unplug Or Not To Unplug? That Is The Holiday Question
If you’re heading away these holidays, it’s likely you’ve workshopped the idea of whether to ‘unplug’ – and I’m not referring to turning off your electricity. Unplugging means turning off devices and disconnecting from the internet – yes, a digital detox! Deep breaths, people, we can talk about this calmly. New research commissioned by McAfee […] more…Oh No! 8 Signs that Grandma’s Getting Baited by a Catfish!
His name was Colonel Lance Shimmeroff. He was a retired U.S. Army officer and happened to be an ace Words With Friends player, according to my 75-year-old mother, who no one in the family could beat at the online game. They played the game often, and he impressed with his word combinations and witty banter. […] more…Instagram Takes Huge Step to Filter Bullies, Become a Kinder Social Hub
You’re a jerk. You’re a fat pig. You’re disgusting. It’s hard to imagine seeing these words written about anyone, but it happens every minute online. But hopefully, Instagram users will be noticing a kinder vibe thanks to the platform’s decision to automatically delete hateful, bullying comments. Instagram, the third most popular social network with 700 […] more…The New Intern-Net
By Cristina Barrera, Channel Team Intern in Plano, Texas. As a college student today, it often feels like it’s essential to get top grades, volunteer, participate in sports, play an instrument, and find a cure for a rare disease in my spare time just to get a job interview. And now, on top of this, […] more…Running from Ransomware: A Mobile User’s Guide
From the second my alarm goes off, my day goes 100 miles a minute. In addition to getting myself ready for work, I have to pack my kids some brag-worthy lunches, conquer the stack of unwashed dishes in the sink from the night before, and make sure that everyone is out the door on time. […] more…The Kids are in Charge
This blog post was written by Ribu, Communications Manager based in Bangalore, India. Kids are wonderful, aren’t they? And what could be better than having a record-breaking 500 children liven up McAfee’s India Development Center on our annual Kids@Work Day. This annual gathering transforms our Bangalore site from an everyday office to a Wonderland. It […] more…Are Your Online Mainframes Exposing You to Business Process Compromise?
by Roel Reyes (Senior Threat Researcher) Legacy mainframes are still used by enterprises to handle big data transactions across a range of industries, from financial institutions, telecoms, and internet service providers (ISPs) to airlines and government agencies. Why are they still in use? As the saying goes: “if it ain’t broke, don’t fix it”. But […] more…10 Tips To Stay Safe Online
With hacks, scams, malware and more, the Internet can feel like a dangerous place these days. And, the recent proliferation of devices, from smartphones and tablets to Internet-connected appliances, has opened us up to even greater risks. But the good news is that by taking just a small handful of security measures we can greatly […] more…Is That Photo Containing a Cyberthreat? What to Know About Steganographic Malware
Secret messages are hidden everywhere – within a hit song, a brand logo, a big blockbuster movie. Usually, these messages are fun Easter eggs or nods to fans. In the digital world, this kind of practice is called steganography, and messages are usually concealed in images, audio tracks, video clips, or text files. But, instead […] more…More information
- Cybercriminals Kick Off UEFA Euro 2012
- High Severity Flaws Patched in Trihedral SCADA Software
- Is ‘SexyDefense’ The Future of Anti-Espionage?
- VOBFUS Evolves, Adds Multiple Languages
- Oracle Java SE/Java SE Embedded CVE-2019-2973 Remote Security Vulnerability
- MWC 2018: Digital and Mobile Security in the 5G IoT Era
- Twitter password recovery bug exposes 10,000 users’ personal information
- Millions of IoT Devices Exposed to Attacks Due to Cloud Platform Vulnerability
- Antivirus doesn’t work. So why are you still using it?
- German Cybersecurity Chief to be Sacked Over Alleged Russia Ties: Sources