How McAfee’s Mentorship Program Helped Me Shine in My Career Journey
By: Anshu, Software Engineer “The mind is not a vessel that needs filling, but wood that needs igniting.”—Mestrius Plutarchus A mentor isn’t someone who answers your questions, but someone who helps you ask the right ones. After joining the McAfee WISE mentorship program as a mentee, I understood the essence of these words. WISE is […] more…IT threat evolution Q1 2019
Targeted attacks and malware campaigns Go Zebrocy Zebrocy was first observed being used as a Sofacy backdoor in 2015. However, the collection of cases where this tool has been used mean that we consider it a subset of activity in its own right. On the basis of this threat actor’s past behaviour, we predicted last […] more…Saving Summer: 5 Strategies to Help Reign In Family Screen Time Over Break
It’s the most wonderful time of the year — for teachers and lifeguards. For everyone else (parents) we have a little prep work to do to make sure the summer doesn’t lull our kids into digital comas. Most of us have learned that given zero limits, kids will play video games, watch YouTube, send snaps, […] more…Mirrorthief Group Uses Magecart Skimming Attack to Hit Hundreds of Campus Online Stores in US and Canada
We uncovered a recent activity involving the notorious online credit card skimming attack known as Magecart. The attack, facilitated by a new cybercrime group, impacted 201 online campus stores in the United States and Canada. We started detecting the attacks against multiple campus store websites on April 14, during which the sites were injected with […] more…How the Trend to Conduct Psychometric Tests for Hiring/Promotion Has Started
There are different trends out there that are making a great impact on the business world. You can see the industry getting revolutionised through different latest strategies and methods. You can find tests that are specially used by the recruiters to ensure that the business is growing at a rapid pace. Certainly the steering at […] more…4 Reasons to Visit Costa Rica
Costa Rica has become one of the go-to destinations in recent times and it is easy to see why. The year round warm temperatures attract sun seekers, but if too much sun is not for you, the temperatures are often cooled down with refreshing bursts of rain. The busiest time of year for people visiting […] more…Game of Threats
Introduction While the way we consume TV content is rapidly changing, the content itself remains in high demand, and users resort to any means available to get at it – including illegal and non-ethical ones like the use of pirated stuff. The world is embracing the idea of paying for entertainment more and more with […] more…ANZAC Day – Nurses of the Great War
ANZAC Day is a big deal to Australians and New Zealanders. With a different meaning to so many, it’s usually regarded as an unnecessary and sad loss of life in a British Empire backed bloodbath, or it’s the most memorable of losing military conflicts that defined both countries and shaped their futures. Remembrance celebrations for […] more…How To Sidestep Popular Social Scams
Each year, internet users lose billions of dollars to online scams, using clever ploys to trick us out of our information and money. By offering prizes, referencing current events, or just creating a sense of urgency, scammers know how to get us to click when we really shouldn’t. Check out these recent scams, so you […] more…DNS Manipulation in Venezuela in regards to the Humanitarian Aid Campaign
Venezuela is a country facing an uncertain moment in its history. Reports suggests it is in significant need of humanitarian aid. On February 10th, Mr. Juan Guaidó made a public call asking for volunteers to join a new movement called “Voluntarios por Venezuela” (Volunteers for Venezuela). According to the media, it already numbers thousands of […] more…New Magecart Attack Delivered Through Compromised Advertising Supply Chain
by Chaoying Liu and Joseph C. Chen On January 1, we detected a significant increase in activity from one of the web skimmer groups we’ve been tracking. During this time, we found their malicious skimming code (detected by Trend Micro as JS_OBFUS.C.) loaded on 277 e-commerce websites providing ticketing, touring, and flight booking services as […] more…APT review of the year
What were the most interesting developments in terms of APT activity throughout the year and what can we learn from them? Not an easy question to answer; everybody has partial visibility and it’s never possible to really understand the motivations of some attacks or the developments behind them. Still, with the benefit of hindsight, let’s […] more…Firefox adds in-browser notification of breached sites
Mozilla has added a data breach notification to Firefox that warns the browser’s users when their email address and credentials may have been obtained by hackers. Dubbed Firefox Monitor, the free breach notification service debuted in September after some testing during the summer. Anyone — not only Firefox users — can steer to the service […] more…Transforming Students into Professionals to Close the Skills Gap: A Million Dollar Investment
Innovation. It’s at the core of any security breakthrough. Just ask an expert in the crowd gathered at MPOWER, McAfee’s Annual Security Summit. And if you ask me, as McAfee’s SVP and chief human resource officer, innovation is not just how our industry can defend against the growing number of cyberthreats, but also how we […] more…Stolen Data from Chinese Hotel Chain and Other Illicit Products Sold in Deep Web Forum
by Fyodor Yarochkin (Senior Threat Researcher) We uncovered personally identifiable information (PII) stolen from a China-based hotel chain being sold on a deep web forum we were monitoring. Further analysis revealed that the stolen data was not only the PII of Chinese customers, but also included the hotel chain’s customers from Western and East Asian […] more…How Machine Learning Can Help Identify Web Defacement Campaigns
By Federico Maggi, Marco Balduzzi, Ryan Flores, and Vincenzo Ciancaglini Website defacement — the act of visibly altering the pages of a website, notably in the aftermath of a political event to advance the political agenda of a threat actor— has been explored in our various research works. We broke down top defacement campaigns in a […] more…More information
- French privacy watchdog dismisses reports of Facebook bug
- Low-code platform provider Airtable enacts new round of layoffs
- Foldable smartphones are important, even if you never get one
- Obfuscated malicious office documents adopted by cybercriminals around the world
- 9 handy hidden features in Google Docs on Android
- Google Photos Flaw Allowed Hackers to Track Users
- Can emojis save you from a terrible password?
- The newest Windows Copilot agent can send emails, update documents on its own
- “Drone” crashes into plane headed for Heathrow landing
- Backdoor Uses Paste Site to Host Payload