Unintended Clipboard Paste Function in Windows 10 Leads to Information Leak in RS1
The McAfee Labs Advanced Threat Research team has been investigating the Windows 10 platform. We have submitted several vulnerabilities already and have disclosed our research to Microsoft. Please refer to our vulnerability disclosure policy for further details or the post from earlier this week on Windows 10 Cortana vulnerabilities. Early last year, a trivial “information leak” […] more…Identifying Network Anomalies in Microsoft Azure – Cloud Workload Security and Azure Network Watcher
Monitoring the Microsoft Azure virtual network Network Watcher is a native Azure service which provides performance monitoring and diagnostic services for Azure tenants. A plethora of logging and diagnostic data are available through Network Watcher which enable insights to your network performance and health. By combining the diagnostic and monitoring capabilities of Network Watcher with […] more…Don’t Play Games With Your Cybersecurity: #RT2Win a Respawn-Worthy Prize
In recent years, gaming has grown drastically in popularity – moving from a niche hobby to a mainstream activity for adults and children alike. So much so that the majority (84%) of parents allow their children to play 1-4 hours of video games every single day. Despite this wide-spread video game use, new research from […] more…Threat Report: Don’t Join Blockchain Revolution Without Ensuring Security
On May 19 researchers discovered a series of vulnerabilities in the blockchain-based EOS platform that can lead to remote control over participating nodes. Just four days prior, a mining pool server for the IOT platform HDAC was compromised, impacting the vast majority of miners. In January the largest-ever theft of cryptocurrencies occurred against the exchange […] more…Don’t Play Games With Your Cybersecurity: Our Findings on the Role of Security in the World of Gaming
Playing video games has become a popular pastime for children of all ages (even for some adults too), as the virtual challenges encourage these players to try their hand at beating the game again and again. In fact, recent McAfee research found that gaming helps prepare these kids for a potential career in cybersecurity. However, […] more…New Cortana Vulnerability Could Allow Cybercriminals to Bypass Lock Screen On Windows 10 Devices
Digital assistants help us look up the weather, play our favorite music, and allow us to quickly access a lot of our personal information. And between Amazon Alexa, Google Home, and Microsoft Cortana – these services have become all the rage these days. However, the latter service, according to the McAfee Labs Advanced Threat Research […] more…Want to Break Into a Locked Windows 10 Device? Ask Cortana (CVE-2018-8140)
June’s “Patch Tuesday” (June 12) is here, but it is likely many Windows 10 users have not yet applied these updates. If you have not, just be sure not to leave your laptop lying around! The patches in this cycle fix a code execution vulnerability using the default settings for Windows 10 and the “Cortana” […] more…#CyberAware: 4 Actionable Steps to Boost Your Family’s Safety Online
Summer has officially rolled out its welcome mat. But as most parents might be thinking about slowing down, for most kids, summer is when digital device use goes into overdrive. That’s why June — which also happens to be Internet Safety Month — is a perfect time strengthen your family’s digital readiness. Good news: This […] more…Millions of Facebook Users May Have Unknowingly Shared Posts Publicly Because of New Bug
Facebook, Facebook, Facebook – between malware leveraging Facebook Messenger to send phishing messages, to apps on the platform mishandling customer data, the social media network has dealt with its fair share of cybersecurity woes these past few months. And just this week, yet another issue has emerged. It was discovered that a bug within Facebook […] more…How To Spot Tech Support Scams
When something goes wrong with your computer or devices, it can cause a panic. After all, most of us depend on technology not only to work and connect with others, but also to stay on top of our daily lives. That’s why tech support scams are often successful. They appear to offer help […] more…Finals Week: Cloud Edition
It’s almost summertime—where the nights are longer and the water is warmer! Before we head to the beach it’s time to review all the things we learned about the cloud from the past two quarters. For #CloudFinalsWeek we’re asking you to prove your knowledge on the current climate of cloud computing and security. Will you […] more…Cybercriminals Steal the Show! 26 Million Ticketfly Customers’ Data Compromised in Massive Breach
When we find out our favorite artist is coming to town, we immediately head to the web to snatch up a ticket to their show. This where ticket distribution services, such as Ticketmaster and TicketFly, become handy, as they allow us to easily input our information to claim a spot for the show. But as […] more…What the Mobile-Born Mean for IoT and Cybersecurity
Since before they knew how to walk, Gen Z – or the mobile-born generation – has had a wealth of information, quite literally, at their fingertips. Their lives are exponentially hyper-connected with social media, music, ride sharing, shopping, and more, all through their mobile devices. But Gen Z’s haste to be on the cutting edge […] more…Come Talk to McAfee at the Gartner Security and Risk Management Summit
A wide group of experts from McAfee will be attending the Gartner Security & Risk Management Summit from June 4-7 in National Harbor, Maryland. The summit brings together an estimated 3400 attendees and over 200 exhibitors looking to share their vision, stories and capabilities with a wider range of cybersecurity and risk management experts. Personally, […] more…McAfee scores 100% in Real World test
It’s the security weaknesses you don’t know about or the next zero-day threat that keeps most of us up at night. That’s why when it comes to testing for effectiveness against threats, it’s critical to look at how a defense works to combat current, real world samples. After all, you need to know how your […] more…Insider Threat at Coca-Cola Compromises 8,000 Employees’ Information
Cybercrime is often seen as a battle of good versus evil – a hacker tries to infiltrate a system while cyber defenders work hard to fend them off. Sometimes, data breaches are the work of these cybercriminals, and other times they’re caused by an actual employee of the affected company – something we like to […] more…More information
- VMware Patches Privilege Escalation Vulnerability in Tools for Windows
- How Secure Is Video Conferencing?
- The Role of Smartphones in the Internet of Everything
- How Apple could lock down the iPhone to thwart government unlock orders
- The Kids are in Charge
- Microsoft Windows Hyper-V CVE-2019-0721 Remote Code Execution Vulnerability
- Zero-Days in WordPress Plugin Actively Exploited
- How to curb hallucinations in Copilot (and other genAI tools)
- Office 365 mailbox provisioning and User Managed Group synchronization to Office 365 will be unavailable.
- Criminals taking a bigger bite of health breaches