Update: Technical McAfee Detail On DoubleAgent
By Cedric Cochin, Brook Schoenfield Updated March 29, 2017 Intel Security / McAfee has been investigating the impact of the so-called “DoubleAgent zero-day” technique of Windows debugging capabilities announced on 22 March 2017. This injection technique uses a Microsoft Windows debugging feature that requires administrative privileges. On the fly debugging is designed to be used […] more…Let the Great McAfee ENS 10.5 Migration Begin!
Since I started writing blogs last year, I’ve experienced some great interaction from the partner community – your perspectives, comments, questions, etc. It’s been a great way to connect with many of you. Over the next few weeks, starting today, I have some pretty big things on my mind that I want to share. ENS […] more…Interview with a Lead Information Security Engineer about His Company’s Experience Migrating to McAfee Endpoint Security
Chris T. is the lead information security engineer on a team that oversees a host of McAfee endpoint and network products at his U.S. insurance company with approximately 8,000 endpoints. The company recently migrated endpoints to ENS 10.2 and plans to migrate to ENS 10.5 in the next three months. Q. What was the driving […] more…CIO Blown Away with Migration to McAfee Endpoint Security 10.2
Intrigued by McAfee Endpoint Security framework, the new more collaborative endpoint protection with dramatically improved performance, threat remediation, intelligence, and forensics? Wondering if you should migrate from your existing endpoint protection? CIO Harry Folloder was too, but no longer. Folloder heads information security at Advantage Waypoint, the leading food services sales and marketing company for […] more…Start the New Year Right With This 3-Step Digital Detox
Pledging to follow healthier habits is consistently the most popular new year’s resolution. That January 1st promise looks different to everyone: snacking less often, going to the gym more often, drinking more water, drinking less soda, etc. This year, instead of a juice cleanse subscription, opt for a healthier habit that’s not an unappetizing shade […] more…How to Quickly Remove Malware in 2022
If you’re like most people, you probably use your computer for most of your online activities. It’s amazing what the internet can do to make our lives easier. But if you’ve spent any time online, you know the internet also comes with some risks. Malware (or malicious software) is one risk of living a connected […] more…Does Windows 10 or 11 Need Antivirus Software?
If your PC runs on Windows 10, you’re in very good company. The Microsoft operating system is the most widely used OS in the world. Many Windows 10 users have also been upgraded to Windows 11 through a rollout that began in 2021. Microsoft plans to complete the Windows update by mid-2022. Unfortunately, its success […] more…Helping Mom & Dad: Online Banking
Editor’s Note: This is the first in a series of articles about how we can help our elder parents get the most out of digital life—the ways we can help them look after their finances and health online, along with how they can use the internet to keep connected with friends and family, all safely […] more…European Telecom Company Expands Its Footprint to Better Protect Users and Customers
Hyper-growth and a determination to stand above the crowd compelled a popular Eastern European telecom to upgrade its trusty McAfee Enterprise security infrastructure, which they relied on for many years to protect their 8,000 corporate endpoints. Competitive pressure to keep costs low and cybercriminals at bay for both their internal users and their customers spurred […] more…5 Online Gaming Tips to Stay Safe From Hackers
For some, vanquishing aliens, building virtual amusement parks, and online battles royale are an excellent stress reliever. As we all know, over the past year there’s been plenty of stress to relieve and more spare time on our hands in which to revel in our hobbies. There was a 30% jump in online gaming traffic from the first to the second quarter of 2020. Hackers are […] more…Beware of BRATA: How to Avoid Android Malware Attack
Cybercriminals go to great lengths to hack personal devices to gather sensitive information about online users. To be more effective, they make significant investments in their technology. Also, cybercriminals are relying on a tactic called social engineering, where they capitalize upon fear and urgency to manipulate unsuspecting device users to hand over their passwords, banking information, or other critical credentials. One evolving mobile device threat that combines malware and social engineering tactics is […] more…Digital Spring Cleaning: Seven Steps for Faster, Safer Devices
Throw open the windows and let in some fresh air. It’s time for spring cleaning. And that goes for your digital stuff too. Whether it’s indeed spring where you are or not, you can give your devices, apps, and online accounts a good decluttering. Now’s the time. Cleaning them up can protect your privacy and […] more…Attention Android Users: This Free VPN App Leaked the Data of 21 Million Users
Attention Android Users: This Free VPN App Leaked the Data of 21 Million Users To live our digital lives to the fullest, we rely on a variety of technologies to support our online activities. And while some apps and devices are meant to make certain tasks more convenient or provide us with greater security, others […] more…Online Banking—Simple Steps to Protect Yourself from Bank Fraud
Online Banking—Simple Steps to Protect Yourself from Bank Fraud Even if you’re not big on online banking, online banking is big on you. Online banking is well on its way to becoming a cornerstone of the banking experience overall. More and more transactions occur over the internet rather than at a teller’s window, and nearly […] more…What is disk cleanup and does it remove viruses?
What is Disk Cleanup and does it remove viruses? It happens. You’re in the middle of a computing task, and your screen blinks. The blue screen (Stop Error) is shown with the message that your PC ran into an error and needs to restart. These hiccups occur when your computer’s software, firmware, or drivers crash […] more…How to Build Your 5G Preparedness Toolkit
5G has been nearly a decade in the making but has really dominated the mobile conversation in the last year or so. This isn’t surprising considering the potential benefits this new type of network will provide to organizations and users alike. However, just like with any new technological advancement, there are a lot of questions […] more…More information
- Philippine Bank Threatens Counter-Suit Over World’s Biggest Cyber-Heist
- FasterXML Jackson-databind CVE-2019-17531 Remote Code Execution Vulnerability
- How Security Products are Tested – Part 1
- Mismanagement Driving Cybersecurity Skills Gap: Research
- Surveillance-Savvy Hong Kong Protesters Go Digitally Dark
- Bitdefender finds eavesdropping vulnerability in public cloud
- Colonial Pipeline Names Adam Tice as Chief Information Security Officer
- Avoid Making Costly Mistakes with Your Mobile Payment Apps
- Chinese Hackers Charged in Decade-Long Crime and Spying Spree
- Intel names a new CFO