Seamless Security for the Connected Consumer
Laptops, mobile phones, tablets, smart watches, and more are all often found in a modern user’s arsenal of personal devices. We rely on these devices for so many things – to wake us up, count calories, connect us to friends and loved ones, provide access to the web, the list goes on. We love our […] more…Check for the Security-First Mindset Across All Teams
We know we need to encourage our teams to think security-first across every department. But what does this really mean in a practical application? For security companies, it might be less of a leap to bring a security mindset to legal, procurement, or marketing teams. For organizations with their core business in another industry, it […] more…A Culture of Security is Built on a Strong First Line of Defense
With the pressure of digital transformation on companies today, executives need to consider how to keep their organization safe amidst rapid change. Most businesses cover their security bases with the basics: advanced analytics, technology using machine-learning and AI, and baseline protocols. But in the face of today’s rising threats, the basics may not be enough. […] more…A Culture of Security Must Extend Beyond the Business
In a world where the lines between personal and corporate data and devices are increasingly blurred, companies benefit when they take the time to educate all staff about online safety. Both the volume and sophistication of cyber threats are growing, and we are more exposed than ever with the level of always-on connectivity constantly at […] more…Train your Cybersecurity Team for Peak Performance
Whether you’re racing to fill cybersecurity jobs to keep up with the changing threat landscape or support your company’s rapid growth, getting your team trained and at the top of their game is a high priority. You need to ensure all new hires are operating with the same baseline of knowledge and skills as your […] more…A Strategic Approach to Retention Helps Build Sustainable Cybersecurity Teams
The demand for cybersecurity talent is outpacing supply across the entire business landscape. Depending on what research you reference, experts predict that by 2020 there will be around 1.5 million to 2 million cybersecurity roles unfilled. This makes employee retention more important than ever before to ensuring the stability and security of your organization. When […] more…McAfee ATR Team Discovers New IoT Vulnerability in Wemo Insight Smart Plugs
From connected baby monitors to smart speakers — IoT devices are becoming commonplace in modern homes. Their convenience and ease of use make them seem like the perfect gadgets for the whole family, but their poor security standards also make them conveniently flawed for someone else: cybercriminals. As a matter of fact, our McAfee Labs […] more…Back to School: 5 Cybersecurity Habits to Teach Your Kids
With back-to-school time already here, cybersecurity should be at the forefront of every parent’s mind. Kids are exposed to more devices – both in the classroom and at home. While their school may already be taking precautions to protect their data while they’re in the classroom, and many of their personal phones have parental controls […] more…Hackers Tee Up a Ransomware Attack for the PGA Ahead of the 2018 Championship
Fore! That’s not a ball hitting the 9th hole, that’s a ransomware attack. You heard correctly – the PGA (Professional Golfers’ Association) was hit with a ransomware attack this week, just days ahead of its annual championship tournament. Specifically, the attack was on the PGA’s computer servers, and is keeping officials from accessing files, such […] more…Ransomware Hits Health Care Once Again, 45,000 Patient Records Compromised in Blue Springs Breach
More and more, ransomware attacks are targeting one specific industry – health care. As detailed in our McAfee Labs Threats Report: March 2018, health care experienced a dramatic 210% overall increase in cyber incidents in 2017. Unfortunately, 2018 is showing no signs of slowing. In fact, just this week it was revealed that patient records […] more…5 Screen Time Principles to Establish When Your Kids are Still Babies
Screen time — how much is too much — is a red-hot issue right now and for good reasons. Now, with several decades of a technology-saturated lifestyle behind us, the research repeatedly tells us: Too much screen time can be detrimental to kids. Balance is the new black when it comes to screen time. However, if […] more…iPhone Users: This Mobile Malware Could Allow Cybercriminals to Track Your Location
The iPhone and many of the apps designed to live on the device have the ability to track our location. Whenever they set up these apps, however, users get the option to opt in or out of location tracking services. But what happens when a malicious campaign doesn’t give users the option to opt of […] more…Six Things your Enterprise Needs to Learn from the DNC Hacking Indictment
All politics aside, the United States Department of Justice on Friday unsealed a judicial indictment against a number of individuals alleged to be from Russia’s intelligence services engaged in activities in 2016. Stepping outside of the context of this party or that party, and politics as a whole – McAfee’s CTO, Steve Grobman noted, “Attribution […] more…Popular Social Media App Timehop Hit With Huge Data Breach
The Fourth of July is characterized by barbeques, fireworks, and patriotism – and now cyberattacks! Just this past Independence Day, the popular social media app Timehop was hacked – as cybercriminals set their sights on the company’s servers, rather than enjoying hot dogs and sparklers. The attack affects a whopping 21 million Timehop users and […] more…AsiaHitGroup Returns With New Billing-Fraud Campaign
Are you tired yet of the music track “Despacito”? If you downloaded this ringtone app from Google Play, chances are your answer is a resounding Yes. But it gets worse: The McAfee Mobile Research team recently found 15 apps on Google Play that were uploaded by the AsiaHitGroup Gang. The ringtone app was one of […] more…Checking In Halfway: The McAfee Labs 2018 Threats Predictions
Time flies when you’re fighting cybercrime. Now that’s not exactly how the phrase goes, but for us at McAfee, it’s hard to believe that we’re already almost halfway through 2018. It seems like just yesterday we were predicting the types of cyberthreats we would see throughout this year with our McAfee Labs 2018 Threats Predictions […] more…More information
- US Seizes $3.4 Billion in Bitcoin Stolen From Silk Road
- Australia mandates cloud use by government agencies
- Why Kids Use Secret Decoy Apps and Why Parents Should Care
- Twitter accounts outside of the US now fall under EU data protection rules
- UK Competition and Markets Authority ramps up big tech antitrust investigations
- The Future of Cyber Through the Eyes of an Intelligence Firm
- Proofpoint to Acquire Meta Networks for $120 Million
- Varied Patch Process by Microsoft Exposes Windows Users: Google Researcher
- AWS tries to protect its customers from DDoS attacks with new service
- LastPass is scrambling to fix another serious vulnerability