Expanding Our Vision to Expand the Cybersecurity Workforce
I recently had the opportunity to testify before Congress on how the United States can grow and diversify the cyber talent pipeline. It’s great that members of Congress have this issue on their radar, but at the same time, it’s concerning that we’re still having these discussions. A recent (ISC) Study puts the global cybersecurity […] more…Leveraging McAfee Endpoint Security to Protect Against Emotet and Other Malware
Customers often ask us how to implement the suggestions provided in our blogs and threat advisories to better protect their environments. The goal of this blog is to do just that. By showing you how to better use our products, you’ll be able to protect against Emotet and other malware. Emotet is a Trojan downloader […] more…Don’t Let Airbnb Scams Stop Your Summer Travel Plans
With summertime just around the corner, many people are planning vacations to enjoy some much-needed R&R or quality time with family and friends. Airbnb offers users a great alternative to a traditional hotel experience when they are looking to book their summer getaways. However, it appears that cybercriminals have used the popularity of the platform […] more…RDP Stands for “Really DO Patch!” – Understanding the Wormable RDP Vulnerability CVE-2019-0708
During Microsoft’s May Patch Tuesday cycle, a security advisory was released for a vulnerability in the Remote Desktop Protocol (RDP). What was unique in this particular patch cycle was that Microsoft produced a fix for Windows XP and several other operating systems, which have not been supported for security updates in years. So why the […] more…How to Get the Best Layered and Integrated Endpoint Protection
Security teams have historically been challenged by the choice of separate next-gen endpoint security technologies or a more integrated solution with a unified management console that can automate key capabilities. At this point it’s not really a choice at all – the threat landscape requires you to have both. The best layered and integrated defenses […] more…We Are Ready on Day One for Our Linux Customers
Our customers look to McAfee to ensure that their enterprises are protected from the changing threat landscape. That’s why we’ve worked with Red Hat, the world’s leading provider of open source solutions for Linux, to ensure that we were part of the entire process leading up to today’s announcement of Red Hat Enterprise Linux 8 […] more…Confused about Cybersecurity Platforms? We Can Help.
“Cybersecurity platform” continues to be an industry buzzword. Vendors talk about it at industry events, and many analysts. But can every vendor claim to offer a platform and also be credible? More importantly, how does that help your business? The security industry has evolved by responding to emerging threats with new, shiny tools, resulting in […] more…Protect Your Digital Life: Why Strong Passwords Matter
Over the years, our lives have become more and more digital. Think about it: 20 years ago, no one was using banking apps and social media had just barely begun coming to fruition. Now, many of us are reliant on mobile banking to pay our bills and we check our favorite social media platforms multiple […] more…McAfee CTO @ RSA: Catching Lightning in a Bottle or Burning Bridges to the Future?
I spoke last week at the RSA Conference in San Francisco on the subject of AI related threats and opportunities in the cybersecurity field. I asserted that innovations such as AI can strengthen our defenses but can also enhance the effectiveness of a cyber attacker. I also looked at some examples of underlying fragility in […] more…You Rang? New Voice Phishing Attack Tricks Unsuspecting Users
In this digital day and age, the average user is likely familiar with the techniques and avenues cybercriminals use to get ahold of personal data and money. With this knowledge, we’ve become smarter and keen to the tricks of the cybercrime trade. However, cybercriminals have become smarter too, and therefore their attacks have become more […] more…Open Backdoors and Voice Assistant Attacks: Key Takeaways from the 2019 Mobile Threat Report
These days, we seem to have a newfound reliance on all things ‘smart.’ We give these devices the keys to our digital lives, entrusting them with tons of personal information. In fact, we are so eager to adopt this technology that we connect 4,800 devices per minute to the internet with no sign of slowing down. […] more…What’s in the Box?
2018 was another record-setting year in the continuing trend for consumer online shopping. With an increase in technology and efficiency, and a decrease in cost and shipping time, consumers have clearly made a statement that shopping online is their preferred method. Chart depicting growth of online, web-influenced and offline sales by year.1 In direct correlation […] more…Your Mobile Phone: Friend or Foe?
Where would we be without our mobile phones? Our kids, boss, friends – so many people reach out to us via our mobile phone. And unfortunately, hackers have also started reaching out – in major ways. The severity of attacks on mobile devices is often underestimated. It is now common to have employees use their […] more…Should you pull your smart plug?
While some may think, “why would I need my toaster to connect to the internet,” smart home devices continue to become more and more popular. In fact, a recent study by Intel found that by 2025, 71% of Americans will have at least one smart device in their home. For many that aren’t ready to […] more…Australian Cybersecurity Firm Experiences Exciting Times as Clients’ Shift to Cloud Accelerates
Patrick Butler, CEO of the Australian cybersecurity firm Loop Secure, is excited about how the cloud is growing his business. His clients are enthused too by the tremendous opportunities and advantages the cloud presents. They’re also a little scared. “Every year more companies are digitizing all aspects of their business—from manufacturing plants coming online to […] more…Apple Users: Here’s What to Do About the Major FaceTime Bug
FaceTime is a popular way for people of all ages to connect with long-distance loved ones. The feature permits Apple users to video chat with other device owners from essentially anywhere at any time. And now, a bug in the software takes that connection a step further – as it permits users calling via FaceTime […] more…More information
- SEC Employees Brought Sensitive Data to Hacker Con
- July 2012 Patch Tuesday Includes Update for MS Security Advisory (2719615)
- How to remove your face from Google’s upcoming Shared Endorsement ads
- Okta Hack Blamed on Employee Using Personal Google Account on Company Laptop
- Apache Guacamole Vulnerabilities Facilitate Attacks on Enterprises
- HP chairman steps down in the wake of corporate difficulties
- Physical Theft Meets Cybercrime: The Illicit Business of Selling Stolen Apple Devices
- Microsoft Exchange Server CVE-2015-2505 Information Disclosure Vulnerability
- Netflix sparks privacy row after making fun of users of Twitter
- Senate bill to allow warrantless government access to your online services