Don’t Take the Bait! How to Steer Clear of Tax Time Scams
For cybercriminals tax time is the most wonderful time of the year. They are in the shadows giddy, eager, and methodically setting a variety of digital traps knowing that enough taxpayers take the bait to render their efforts worthwhile. Indeed, with the frenzy of online tax filings, personal information (and money) moving through mailboxes, and […] more…Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […] more…Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […] more…Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […] more…Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […] more…Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […] more…Special Delivery: Criminals Posing as Amazon Are Out to Steal User’s Data
One of the joys of online shopping is instant gratification – your purchases arrive on your doorstep in just a few days! Unfortunately, consumers aren’t the only ones taking advantage of this convenience – hackers are also using it to trick users into handing over money or data. Recently, AARP recounted several scams where cybercriminals posed as Amazon’s customer […] more…KBOT: sometimes they come back
Although by force of habit many still refer to any malware as a virus, this once extremely common class of threats is gradually becoming a thing of the past. However, there are some interesting exceptions to this trend: we recently discovered malware that spread through injecting malicious code into Windows executable files; in other words, […] more…The Seven Main Phishing Lures of Cybercriminals
One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to America Online (AOL) every day. And if we know one thing about cybercriminals, it’s that they tend to follow the masses. In earlier iterations, phishing attempts were easy to […] more…Assessing the impact of protection from web miners
Brief summary: We present the results of evaluating the positive economic and environmental impact of blocking web miners with Kaspersky products. The total power saving can be calculated with known accuracy using the formula <w>·N, where <w> is the average value of the increase in power consumption of the user device during web mining, and […] more…Beware of Back-To-School Scams
These days it seems that there is a scam for every season, and back-to-school is no different. From phony financial aid, to debt scams, and phishing emails designed to steal your identity information, there are a lot of threats to study up on. Of course, many of these scams are just different twists on the […] more…How To Help Your Kids Manage Our ‘Culture of Likes’
As a mum of 4 sons, my biggest concerns about the era of social media is the impact of the ‘like culture’ on our children’s mental health. The need to generate likes online has become a biological compulsion for many teens and let’s be honest – adults too! The rush of dopamine that surges through […] more…How the Trend to Conduct Psychometric Tests for Hiring/Promotion Has Started
There are different trends out there that are making a great impact on the business world. You can see the industry getting revolutionised through different latest strategies and methods. You can find tests that are specially used by the recruiters to ensure that the business is growing at a rapid pace. Certainly the steering at […] more…Game of Threats
Introduction While the way we consume TV content is rapidly changing, the content itself remains in high demand, and users resort to any means available to get at it – including illegal and non-ethical ones like the use of pirated stuff. The world is embracing the idea of paying for entertainment more and more with […] more…How Machine Learning Can Help Identify Web Defacement Campaigns
By Federico Maggi, Marco Balduzzi, Ryan Flores, and Vincenzo Ciancaglini Website defacement — the act of visibly altering the pages of a website, notably in the aftermath of a political event to advance the political agenda of a threat actor— has been explored in our various research works. We broke down top defacement campaigns in a […] more…Supporting Our Military Veterans at McAfee
By Dawson McPherson, Talent & Communications Coordinator Over the past week, McAfee employees around the world paused to recognize and honor all the brave military men and women who have served their countries. From a veterans appreciation ceremony at our Plano, Texas office, to a display of red poppies in observation of Remembrance Day at […] more…More information
- Improving BGP routing security by minding your MANRS
- MatrixSSL Vulnerabilities Expose IoT Devices to Attacks
- iOS Users Aren’t So Immune to Threats After All
- EU releases its 5G conclusions
- Business Services Provider Conduent Hit by Ransomware
- Judge dismisses police attempt to get Lauri Love’s encryption keys
- How So Many Researchers Found a 20-Year-Old Chip Flaw At the Same Time
- Nuclear Exploit Kit Evolves, Includes Silverlight Exploit
- New Legislation Would Block US Firms From Storing Personal Data in China, Russia
- Microsoft SharePoint Server CVE-2018-8572 Remote Privilege Escalation Vulnerability