State County Authorities Fail at Midterm Election Internet Security
One of the things we at McAfee have been looking at this midterm election season is the security of election infrastructure at the individual county and state levels. A lot of media and cybersecurity research focus has been placed on whether a major national attack could disrupt the entire U.S. voting infrastructure. Headlines and security […] more…Insights on the Capabilities of Three Politically-Themed Ransomware Campaigns
We all hear politicians’ names week over week – what policies they’re working on, new initiatives they’re implementing for their respective country, the list goes on. And now, we’re hearing about their names in a new context. Specifically, former U.S. President Barak Obama, current U.S. President Donald Trump, and Chancellor of Germany Angela Merkel all […] more…Could the Photos You’re Sharing Online Be Putting Your Child at Risk?
Confession time. I’m a mom that is part of the problem. The problem of posting photos of my kids online without asking for their permission and knowing deep down that I’m so excited about sharing, I’m not paying much attention at all to the risks. Why do I do it? Because I’m madly in love […] more…‘Insight’ into Home Automation Reveals Vulnerability in Simple IoT Product
Eoin Carroll, Charles McFarland, Kevin McGrath, and Mark Bereza contributed to this report. The Internet of Things promises to make our lives easier. Want to remotely turn lights and appliances on and off and monitor them online? A “smart plug,” a Wi-Fi–connected electric outlet, is one simple method. But IoT devices can turn into attack […] more…Spam and phishing in Q2 2018
Quarterly highlights GDPR as a phishing opportunity In the first quarter, we discussed spam designed to exploit GDPR (General Data Protection Regulation), which came into effect on May 25, 2018. Back then spam traffic was limited to invitations to participate in workshops and other educational events and purchase software or databases. We predicted that fraudulent […] more…IT threat evolution Q2 2018. Statistics
Q2 figures According to KSN: Kaspersky Lab solutions blocked 962,947,023 attacks launched from online resources located in 187 countries across the globe. 351,913,075 unique URLs were recognized as malicious by Web Anti-Virus components. Attempted infections by malware designed to steal money via online access to bank accounts were logged on the computers of 215,762 users. […] more…A study of car sharing apps
The growing popularity of car sharing services has led some experts to predict an end to private car ownership in big cities. The statistics appear to back up this claim: for example, in 2017 Moscow saw the car sharing fleet, the number of active users and the number of trips they made almost double. This […] more…Popular Social Media App Timehop Hit With Huge Data Breach
The Fourth of July is characterized by barbeques, fireworks, and patriotism – and now cyberattacks! Just this past Independence Day, the popular social media app Timehop was hacked – as cybercriminals set their sights on the company’s servers, rather than enjoying hot dogs and sparklers. The attack affects a whopping 21 million Timehop users and […] more…Malicious Macro Hijacks Desktop Shortcuts to Deliver Backdoor
by Loseway Lu Despite being around for decades, cybercriminals are still using malicious macro to deliver malware, albeit in more creative ways to make them more effective. The threat actors behind a recent case used macro in a more roundabout way, with a macro that searches for specific shortcut files in the user’s system, which […] more…Want to Break Into a Locked Windows 10 Device? Ask Cortana (CVE-2018-8140)
June’s “Patch Tuesday” (June 12) is here, but it is likely many Windows 10 users have not yet applied these updates. If you have not, just be sure not to leave your laptop lying around! The patches in this cycle fix a code execution vulnerability using the default settings for Windows 10 and the “Cortana” […] more…It’s a Zoo Out There! Data Analysis of Alleged ZooPark Dump
In early May, researchers disclosed a Mobile malware campaign by a group focused on Middle Eastern targets. This actor was found to be an evolving and sophisticated group using fake Android apps, namely Telegram, to trick users into installing malicious software. They have been active since 2015 and evolved over several campaigns into 2018. On […] more…The Past, Present, and Future of Password Security
In simpler times, passwords broke down physical barriers – they allowed people into secret gatherings, opened safes, the list goes on. Enter the digital era, and passwords now act as the gatekeepers to our personal data, as they lock down everything from our social media accounts to our email inboxes. No matter the era, passwords […] more…Understanding Code Signing Abuse in Malware Campaigns
Using a machine learning system, we analyzed 3 million software downloads, involving hundreds of thousands of internet-connected machines, and provide insights in this three-part blog series. In the first part of this series, we took a closer look at unpopular software downloads and the risks they pose to organizations. We also briefly mentioned the problem […] more…McAfee Security Innovation Alliance 2017 DevCon Awards
Innovation and enthusiasm fuel the McAfee Security Innovation Alliance program, and we are excited to see that our partners are actively pursuing opportunities to integrate their products with our technologies to extend our open, connected ecosystem. Every year at the McAfee Security Innovation Alliance Developers Conference (SIA DEVCON)—which, this year is taking takes place in […] more…A Closer Look at North Korea’s Internet
By Vladimir Kropotov, Philippe Z Lin, Fyodor Yarochkin and Feike Hacquebord Introduction North Korea’s presence on the internet is commonly perceived as something that only goes one way: hackers go out, nothing gets in. Incidents like the Sony Pictures hack in 2014 and a couple of global bank heists were reported to be the work of North […] more…Fake News: What Every Parent Needs To Know
Fake news: we’ve all heard about it but what does it actually mean? Is it really a new concept or just a fancy buzzword? What Is Fake News? Well let’s keep it simple. Fake news is news that deliberately isn’t factually accurate. It’s a type of pseudo-journalism that spreads premeditated misinformation or hoaxes via traditional […] more…More information
- Mozilla faces resistance over DNS privacy test
- ‘Black Kingdom’ Ransomware Operators Target Pulse Secure VPNs
- Cisco Patches High-Severity Vulnerabilities in IOS Software
- Expectations for CISOs Have Changed
- Update: Angel out of service tomorrow morning starting at 4am
- Digital Marriage—Making Sure Your Online Wedding is Safe and Secure
- AT&T says customer data accessed to unlock smartphones
- Cannabis Banking Startups Want to Make It Easy to Buy Weed
- The Impact of Recycling on Industrial Cyber Security
- Cybersecurity VC Funding Hit Record in 2020 With $7.8 Billion Invested