Come Talk to McAfee at the Gartner Security and Risk Management Summit
A wide group of experts from McAfee will be attending the Gartner Security & Risk Management Summit from June 4-7 in National Harbor, Maryland. The summit brings together an estimated 3400 attendees and over 200 exhibitors looking to share their vision, stories and capabilities with a wider range of cybersecurity and risk management experts. Personally, […] more…FIFA public Wi-Fi guide: which host cities have the most secure networks?
We all know how easy it is for users to connect to open Wi-Fi networks in public places. Well, it is equally straightforward for criminals to position themselves near poorly protected access points – where they can intercept network traffic and compromise user data. A lack of essential traffic encryption for Wi-Fi networks where official […] more…Netkids
Children today are completely at home in the digital space. They use digital diaries and textbooks at school, communicate via instant messaging, play games on mobile devices (not to mention PCs and consoles), and create mini masterpieces on tablets and laptops. This total immersion in the digital universe is a concern for many parents, but […] more…The New Security Experience
Everyone has their limits — limited budget, limited staffing and time — but we seldom take into account the basic limitations imposed on us by something we can hardly control: our minds. But understanding limits helps us work with them, not against them. Following years of hard work and focus, we have now begun to […] more…Women in the McAfee Channel
At McAfee, we work hard to advocate and empower women in what remains a male-dominated industry. Women currently make up less than 20 percent of U.S. tech jobs, despite making up more than half of the U.S. workforce, according to recent data compiled by virtual event solutions company, Evia. Considering the great talent and diversity […] more…Major Canadian Banks Investigating Data Breach Claims
Two major Canadian banks informed customers on Monday that they launched an investigation after hackers claimed to have obtained personal and account information as a result of a data breach. read more more…EaseUS: The Free Data Recovery Software for Windows
Looking for the data recovery software tools for windows operating system then here’s you can find best Data Recovery Software for Windows that help out by resorting the deleted files from your computer quickly. That has to to be seen in the matter of what’s the need of one more? It was most prevalent ever […] more…Trojan watch
We continue to research how proliferation of IoT devices affects the daily lives of users and their information security. In our previous study, we touched upon ways of intercepting authentication data using single-board microcomputers. This time, we turned out attention to wearable devices: smartwatches and fitness trackers. Or more precisely, the accelerometers and gyroscopes inside […] more…Identifying Top Vulnerabilities in Networks: Old Vulnerabilities, IoT Botnets, Wireless Connection Exploits
by Tony Yang, Adam Huang, and Louis Tsai We have noted time and again how compromising networks and connected devices is rooted in finding weak points in the system. Often, these are in the form of vulnerabilities. Worse, vulnerabilities that aren’t even new. In the context of the internet of things (IoT) and noteworthy security […] more…McAfee earns a Top Product Award from AV-Test!
McAfee achieved a near perfect score of 17.5 for both McAfee Internet Security (MIS) 20.8, and McAfee Endpoint Security (ENS) 10.5.3, in the areas of protection, performance and usability in the latest round of testing from AV-Test. The AV-TEST Institute, a leading international and independent service provider in the fields of IT security and anti-virus […] more…Backdoors in D-Link’s backyard
“If you want to change the world, start with yourself.” In the case of security research this can be rephrased to: “If you want to make the world safer, start with the smart things in your home.” Or, to be more specific, start with your router – the core of any home network as well […] more…McAfee Showcases ESM-TYCHON Cyber Scorecard at Security Through Innovation Summit
On Tuesday, May 22, McAfee will host the 2018 Security Through Innovation Summit at the Willard Intercontinental Hotel in Washington, D.C. The half-day event will showcase a dynamic lineup of private and public sector experts addressing the key issues central to the future of federal cybersecurity and IT. This year’s showcase features the latest certified […] more…I know where your pet is
Kaspersky Lab’s many years of cyberthreat research would suggest that any device with access to the Internet will inevitably be hacked. In recent years, we have seen hacked toys, kettles, cameras, and irons. It would seem that no gadget has escaped the attention of hackers, yet there is one last bastion: “smart” devices for animals. […] more…GPON Vulnerabilities Exploited for Mexico-based Mirai-like Scanning Activities
by Trend Micro IoT Reputation Service Team and Trend Micro Smart Home Network Team In April, we discussed our findings on increased activity originating from China targeting network devices in Brazil that mimicked the Mirai botnet’s scanning technique. We recently found similar Mirai-like scanning activity from Mexico. The difference in these attacks, however, is that […] more…IT threat evolution Q1 2018. Statistics
Q1 figures According to KSN: Kaspersky Lab solutions blocked 796,806,112 attacks launched from online resources located in 194 countries across the globe. 282,807,433 unique URLs were recognized as malicious by Web Anti-Virus components. Attempted infections by malware designed to steal money via online access to bank accounts were logged on the computers of 204,448 users. […] more…IT threat evolution Q1 2018
Targeted attacks and malware campaigns Skygofree: sophisticated mobile surveillance In January, we uncovered a sophisticated mobile implant that provides attackers with remote control of infected Android devices. The malware, called Skygofree (after one of the domains it uses), is a targeted cyber-surveillance tool that has been in development since 2014. The malware is spread by […] more…More information
- Manipulating WordPress Plugin Functions to Inject Malware
- How to use Excel formulas and functions
- Irish Regulator Investigates Facebook Over Exposed Passwords
- Hackers Exploit Recently Patched Apache Struts Flaw
- Optical fibers fit for the age of quantum computing
- White hat hackers reveal holes in NSA website
- Facebook shines a little light on ‘shadow profiles’
- Microsoft Windows CVE-2016-0041 DLL Loading Local Privilege Escalation Vulnerability
- Mexican Privacy Watchdog Criticizes Government Over Spyware
- The quantified employee: new ways to be watched at work