How to Protect Your Connected Devices from Common Cyberattacks
When it comes to internet security, we all suffer from a condition known as optimism bias. It’s the simple idea that we, individually, won’t be affected negatively by an externality compared to others. The same mental distortion happens in the digital world. We read a lot about cybercrime and assume the consequences of those attacks […] more…Aussie Ruby Rose is McAfee’s Most Dangerous Celebrity
Keeping up to date with celebrity gossip is a sport for many of us. Staying on top of what your favourite celebrity wore to the latest Hollywood shindig and, of course who they were with can be very time consuming and often require extensive searching! But did you know that searching for your favourite celebrity […] more…Facebook Announces Security Flaw Found in “View As” Feature
Another day, another Facebook story. In May, a Facebook Messenger malware named FacexWorm was utilized by cybercriminals to steal user passwords and mine for cryptocurrency. Later that same month, the personal data of 3 million users was exposed by an app on the platform dubbed myPersonality. And in June, millions of the social network’s users […] more…Understanding Your Kid’s Smart Gadgets
When people think about IoT devices, many often think of those that fill their homes. Smart lights, ovens, TVs, etc. But there’s a whole other type of IoT devices that are inside the home that parents may not be as cognizant of – children’s toys. In 2018, smartwatches, smart teddy bears, and more are all […] more…Netflix Users: Don’t Get Hooked by This Tricky Phishing Email
If you own a smart TV, or even just a computer, it’s likely you have a Netflix account. The streaming service is huge these days – even taking home awards for its owned content. So, it’s only natural cybercriminals are attempting to leverage the service’s popularity for their own gain. In fact, just discovered last […] more…5 Simple But Powerful Career Tips
Getting ahead in your career doesn’t happen by accident. It requires planning and constant pursuit. That’s why working for a company that invests in you, truly wants you to succeed and enables you to grow personally and professionally makes a big difference in your career progression. This week McAfee hosted our first-ever CMO Development Forum […] more…‘McAfee Labs Threats Report’ Highlights Cryptojacking, Blockchain, Mobile Security Issues
As we look over some of the key issues from the newly released McAfee Labs Threats Report, we read terms such as voice assistant, blockchain, billing fraud, and cryptojacking. Although voice assistants fall in a different category, the other three are closely linked and driven by the goal of fast, profitable attacks that result in […] more…5 Ways to Protect Your Finances Online
Financial companies continue to innovate with their online products and services, bringing conveniences for customers, but challenges when it comes to security. This is because the current “fintech” (financial technology) landscape doesn’t just include traditional banks with online services. New players, like cryptocurrency sites, robo advisors and online loan providers have all joined the party. […] more…Announcing McAfee’s Evolved Consumer Product Portfolio
Every fall the leaves change colors, sweaters replace sundresses, and new changes are afoot. Especially for us at McAfee. In fact, we’re announcing quite a few changes to our consumer security portfolio this fall. Tailored to the increasingly connected world we live in, our evolved line of products focuses on better performance, better ransomware protection, […] more…Cyber Threat Alliance Releases Analysis of Illicit Cryptocurrency Mining
In response to the explosive increase in cryptomining campaigns in Q4 2017, the Cyber Threat Alliance has formed a cryptomining subcommittee to assess the threat. This committee comprises expert researchers from major cybersecurity companies, including McAfee. The committee has now released “The Illicit Cryptocurrency Joint Analysis,” an in-depth report on the current state of unlawful […] more…Mobile and Digital Payments: Worth the Risk?
Thanks in part to the convenience that our mobile devices provide for us, much of the world operates now on instant gratification. From accessing information on the web to doing work –and now sending and receiving digital payments– our devices and applications support us while we’re on the go. Whether we’re paying a friend for […] more…Political Figures Differ Online: Names of Trump, Obama, Merkel Attached to Ransomware Campaigns
Politics and ransomware. No, it’s not a lost single from the Oasis back catalogue, but in fact a relatively recent tactic by ransomware developers looking to exploit the profiles of major politicians to install ransomware on victims’ computers. Donald Trump, Angela Merkel, and now Barack Obama all serve as lures for the unsuspecting. Despite its […] more…Insights on the Capabilities of Three Politically-Themed Ransomware Campaigns
We all hear politicians’ names week over week – what policies they’re working on, new initiatives they’re implementing for their respective country, the list goes on. And now, we’re hearing about their names in a new context. Specifically, former U.S. President Barak Obama, current U.S. President Donald Trump, and Chancellor of Germany Angela Merkel all […] more…Inside a Modern-Day Smart Home
Ever wonder how the Internet of Things (IoT) first began? Often regarded as the first IoT device, John Romkey created a toaster that could be turned on and off over the internet for the October ’89 INTEROP conference. Then in 2000, LG announced its first internet refrigerator plans. So on and so forth IoT grew […] more…Where is Your Security Management Journey Going?
Navigating security management is an ongoing process and sometimes erratic given the chaotic threat environment. Maneuvering these often-uncharted cyber seas proves complicated and difficult. Is your cybersecurity vessel capable of sailing through tumultuous tides? Earlier this year we set out to obtain a snapshot of where organizations (McAfee & non-McAfee customers) were in their security […] more…Trending: IoT Malware Attacks of 2018
Since January 1st of 2018, a barrage of cyberattacks and data breaches have hit almost every industry, targeting businesses large and small, many of which are now from IoT devices. By 2025, it is estimated that there will be approximately 75 billion connected devices around the world. With more IoT devices –from wearables and pacemakers […] more…More information
- Patch now! Half a million Exim mail servers need an urgent update
- SSCC 122 – Facebook hoax, Microsoft 0-day, Android hole and Firefox going forward [PODCAST]
- Tesla plans to launch driverless taxi service next year
- Resolved: Resolved: Outage: Office 365 log in is partially unavailable
- FireEye’s $1B Mandiant Buyout: Is the Price Too High or Too Low?
- Microsoft Windows Kernel Mode Driver CVE-2015-1678 Local Information Disclosure Vulnerability
- Apple Patches Four Vulnerabilities in macOS
- AI agent platforms could push down SaaS license costs, report argues
- Nomophobia and other technology-induced fears
- Microsoft Internet Explorer CVE-2014-4111 Remote Memory Corruption Vulnerability