How to Protect Your Privacy in a Connected World
Not so long ago computers were our only connection to the internet, but these days we are almost constantly connected, through our phones, homes, autos, and even our children’s toys. In fact, research firm Gartner estimates that we now have over 8.4 billion connected “things” in use and that number will continue to grow rapidly. […] more…My Friends, it’s True. The Times, They Are A’changin.’
If you’ve ever heard that Bob Dylan song, you’ll know what I’m talking about. As the music legend serenades you with his unique voice, you start to realize that what he’s really saying is that nothing stays the same. The things of yesterday are not the things of tomorrow. read more more…McAfee CEO Chris Young Talks About the Impact of Connected Devices in MWC 2018 Keynote
MWC 2018 came and went in the blink of an eye and new mobile innovations and exciting announcements emerged from vendors across the globe. Though we had our fair share of unique insights and innovations to share, we also had the pleasure of leading the conversation around the foundations of the digital economy, as McAfee […] more…MWC 2018: Takeaways on the Key Devices and Innovations
It’s hard to believe that MWC 2018 is already over! Though the event came and went in the blink of an eye, MWC 2018 managed to deliver, showcasing some of the most exciting mobile and connected device innovation out there today. While there was a variety of new tech at the event, a few showstoppers […] more…A Map of the Most Dangerous Sources of Cybercrime
This blog post was written by James Andrew Lewis, senior vice president at the Center for Strategic and International Studies (CSIS). Now that 3 companies and 13 individuals from Russia have been indicted for U.S. election interference, the general American populace has insight into a problem that has been growing for years: Russia has little […] more…McAfee’s Podcast Hackable? is Back for Season Two
We live in a digital era, which means the more things are becoming internet-connected, the more opportunities hackers have to infiltrate our lives. McAfee created the podcast Hackable? to raise awareness about the extreme lengths hackers are willing to go in order to steal our personal information. This show takes hacks seen throughout pop culture […] more…What do cybersecurity and the board game Battleship have in common?
A long day of encouraging a customer to reconsider their lack of desire to develop a plan, build a security architecture that included automation and orchestration – with the ability to measure value vs. just adding tools as needed – led to a very late-night drive home. I was encouraged the customer invited me back […] more…How Hackers Bypassed an Adobe Flash Protection Mechanism
The number of Flash Player exploits has recently declined, due to Adobe’s introduction of various measures to strengthen Flash’s security. Occasionally, however, an exploit still arises. On January 31, Kr-Cert reported a zero-day vulnerability, identified as CVE-2018-4878, being exploited in the field. (Adobe has released an update to fix this flaw.) We analyzed this vulnerability […] more…Key Mobile Threat Takeaways from the 2018 Mobile Threat Report
The term “mobile” has come to encompass a wide range of devices these days. Mobile devices have become much more than our Androids and iPhones. Wearable watches, tablets, even home devices all fall under the mobile umbrella of IoT and have the ability to impact our lives for better, or for worse. This rich IoT […] more…Key Mobile Threat Takeaways from the 2018 Mobile Threats Report
The term “mobile” has come to encompass a wide range of devices these days. Mobile devices have become much more than our Androids and iPhones. Wearable watches, tablets, even home devices all fall under the mobile umbrella of IoT and have the ability to impact our lives for better, or for worse. This rich IoT […] more…How McAfee is Adapting to the Mobile Landscape with New Partnerships and Innovation
Mobile World Congress (MWC) 2018 is finally upon us, and mobile and security providers from around the world are in Barcelona presenting the latest and greatest insight and innovation. At this year’s MWC, McAfee is excited to present our own unique insights and innovations, some of which are supported by our partners. These include: the […] more…New McAfee Report Reveals Identity Theft is the Most Expensive Form of Property Crime
Between Uber, Equifax, and a handful of others, the U.S. has witnessed major data breaches in the past year that have compromised the personal information of millions, leaving them to deal with the possibility of identity theft. And the impact is not lost on consumers, as according to a recent McAfee survey, 61% of consumers […] more…DDoS Attacks in the Netherlands Reveal Teen Gamers on Troublesome Path
At the end of January, the Netherlands was plagued by distributed denial of service (DDoS) attacks targeting various financial institutions, tech sites, and the Dutch tax authorities. At the time of the attacks it was unclear who was responsible, and this led to speculation among security experts. Coincidentally, the attacks started a few days after […] more…To See Mugshots of Today’s Bank Robbers, Look at a World Map
In Depression-era America, bank robbers John Dillinger, Baby Face Nelson, and Pretty Boy Floyd were household names. Newspapers detailed their heists, radios narrated their getaways, wanted posters plastered their mug-shot scowls from coast-to-coast. Every detail of their bank robberies and personal lives was seized upon, scrutinized, circulated, and discussed. Eight decades later, bank robbery is […] more…The Many Forms of IP Theft Add Up to Big Losses
U.S. military drone technology surfaces on the black market and is bought by arms dealers. A pharmaceutical company based in Eastern Europe obtains trade secrets divulging the recipe for a popular prescription medication. A business that rejected an architect’s bid nevertheless uses part of that plan in construction. An advance copy of a much-anticipated “Game […] more…MWC Preview: Tailoring Security to the Modern Connected Lifestyle
In 2018, we’re officially living in the “future” imagined by popular 80s movies. No, we still don’t have flying cars, but what we do have is many unique internet-connected devices. These devices can do it all – track our fitness, turn our lights on and off, allow us to live in a virtual reality – […] more…More information
- ChatGPT, the AI Revolution, and the Security, Privacy and Ethical Implications
- Resolved: WikiSpaces May Be Slow to Respond
- Users Warned of Zcash Miner Infections
- Facebook Steps Up Security Amid Fresh Signs of Russia Meddling
- Microsoft "tops up" Patch Tuesday, issues delayed fix for zero-day hole in logon security
- The most sophisticated Android Trojan
- Spot virtual workplace creators on the future of work
- New products of the week 7.25.16
- Seven Ways to Improve Efficiency in Your Security Metrics Program
- Video captures glitching Mississippi voting machines flipping votes