Ransomware Hits Health Care Once Again, 45,000 Patient Records Compromised in Blue Springs Breach
More and more, ransomware attacks are targeting one specific industry – health care. As detailed in our McAfee Labs Threats Report: March 2018, health care experienced a dramatic 210% overall increase in cyber incidents in 2017. Unfortunately, 2018 is showing no signs of slowing. In fact, just this week it was revealed that patient records […] more…Hit the brakes! Did Your Car Just Get Hacked?
Could your car be the next target of a cyber attack? You might not think so, but new research has shown otherwise. The overall safety of your vehicle used to be rather straightforward to maintain with tune-ups, replaced brake pads, flushes and other scheduled upkeep. Unfortunately, with the incorporation of computer systems into newer car […] more…AI bubble watch: OpenAI to burn through $115B by 2029
The AI emperor is not wearing any clothes — I mean, seriously, he’s as naked as a jaybird. Or to be more precise, the big-name AI companies are burning through unprecedented amounts of money this year. With no clear plan to make a profit anytime soon. (Sure, Nvidia is coining cash with its chip foundries, […] more…Google’s €2.95 billion EC antitrust fine is just the beginning
The European Commission (EC) on Friday hit Google with a €2.95 billion ($3.46 billion) antitrust fine for “abusive practices” in its adtech business. But observers said that IT leaders should look at the decision as a warning about a potential wave of global regulatory decisions on tech issues. For example, Friday also saw a major […] more…14 hidden Pixel features for smarter calling
Pixel phones are filled with efficiency-enhancing Google intelligence, and one area that’s all too easy to overlook is the way the devices can improve the act of actually talking on your cellular telephone. That’s true for any Pixel model, no matter how old it may be, and it’s especially true for the more recent Pixel […] more…Everything we know about Apple Intelligence
Apple devices support Apple Intelligence, the growing collection of artificial intelligence (AI) tools the company began to roll out in October 2024. These include both consumer-friendly tools such as automatic mixing in Apple Music alongside a growing selection of increasingly powerful tools to get tasks done, ranging from writing tools to image creation, visual intelligence, […] more…Cyber Insights 2023 | Zero Trust and Identity and Access Management
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […] more…Cyber Insights 2023 | Ransomware
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […] more…Cyber Insights 2023 | Regulations
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […] more…Cyber Insights 2023: Artificial Intelligence
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […] more…New Year, New You: Start Fresh With McAfee Protection Score
Are you an online oversharer? Do you give your full birthday to all your online shopping accounts? Have a few companies you have accounts with been breached but you didn’t take any action at the time? If you have bad digital habits, now is an excellent time to reset your digital presence. In isolation, these […] more…Choosing Christmas gifts for kids: Squid Game and Huggy Wuggy are trending
As the holidays approach, many of us are trying to figure out what to buy our family and friends. We especially want to make this time of year festive for kids. If you want to delight children, you need to know what they’re interested in: what LEGO set they’re dreaming about, what superheroes they’d be […] more…It’s All About You: McAfee’s New All-Consumer Focus
This week, McAfee took an exciting new step in our journey—we are now a pure-play consumer company. What does that mean for consumers? It means that McAfee will be able to focus 100% of our talent and expertise on innovation and development that directly enables and improves the products and services that protect you and your family. It’s the right time to take […] more…COVID-19 Vaccine Passports: 5 Security Tips for You and Your Family
Depending on where your travels take you, you might need a new passport—a COVID-19 vaccine passport. In an effort to kickstart travel and local economies, these so-called vaccine passports are more accurately a certificate. Such a “passport” can offer proof that the holder has been fully vaccinated against the virus, and there are several of these passports developing in the wings. With all of this in motion, I wanted to give families a look at […] more…Kids on the Web in 2021: Infinite creativity
For over a year we’ve been living in a world gripped by the COVID-19 pandemic. Not only has the pandemic affected people’s lifestyles, it has also accelerated the development and implementation of technologies that make it easier for us to complete everyday and work-related tasks. We no longer need to fly halfway around the world […] more…Evolution of JSWorm ransomware
Introduction Over the past few years, the ransomware threat landscape has been gradually changing. We have been witness to a paradigm shift. From the massive outbreaks of 2017, such as WannaCry, NotPetya, and Bad Rabbit, a lot of ransomware actors have moved to the covert but highly profitable tactic of “big-game hunting”. News of ransomware […] more…More information
- Dan Geer: US should buy zero-days, reveal them
- Hacker was able to take complete control of a computer running Popcorn Time
- Microsoft Internet Explorer CVE-2014-2818 Remote Memory Corruption Vulnerability
- Three Ways of Looking at Security Operations
- NSA: Edward Snowden had help
- Oops! Apple leaks photo of new MacBook Pro with OLED Magic Toolbar
- Hacking The Human Mind via Social Engineering
- NVIDIA Patches AMI BMC Vulnerabilities Impacting Several Major Vendors
- No, there’s no evidence (yet) the feds tried to hack Georgia’s voter database
- Update: Canvas will be unavailable