Demystifying Blockchain: Sifting Through Benefits, Examples and Choices
You have likely heard that blockchain will disrupt everything from banking to retail to identity management and more. You may have seen commercials for IBM touting the supply chain tracking benefits of blockchain.[i] It appears nearly every industry is investing in, adopting, or implementing blockchain. Someone has probably told you that blockchain can completely transform […] more…House Actions on Election Security Bode Well for 2020
As a U.S. cybersecurity company, McAfee supports legislation that aims to safeguard U.S. election security. After the 2016 election, McAfee sees the importance of improving and preserving election security; we even offered free security tools to local election boards prior to the 2018 elections and released educational research on how localities can best protect themselves […] more…What You Can Do to Reduce Your E-Waste This World Environment Day
Our love of technology and often biological need for new devices has created one of the biggest environmental issues of our time – e-waste. Today is World Environment Day – a great opportunity to ensure we are doing all we can to minimise landfill and protect our precious environment. Over the last 12 months, BYO […] more…3 Tips for Protecting Against the New WhatsApp Bug
Messaging apps are a common form of digital communication these days, with Facebook’s WhatsApp being one of the most popular options out there. The communication platform boasts over 1.5 billion users – who now need to immediately update the app due to a new security threat. In fact, WhatsApp just announced a recently discovered security […] more…Level Up Your Cybersecurity: Insights from Our Gaming Survey
Online gaming has seen a rise in popularity over the years. Many people see it as a way to unwind from a stressful day or complete new challenges. However, just like any other internet-connected channel, online gaming can expose users to a variety of cybersecurity risks. So, to examine the relationship between cybersecurity and gaming, […] more…What Your Password Says About You
At the end of last year, a survey revealed that the most popular password was still “123456,” followed by “password.” These highly hackable choices are despite years of education around the importance of password security. So, what does this say about people who pick simple passwords? Most likely, they are shooting for a password that is […] more…IoT Lockdown: Ways to Secure Your Family’s Digital Home and Lifestyle
If you took an inventory of your digital possessions chances are, most of your life — everything from phones to toys, to wearables, to appliances — has wholly transitioned from analog to digital (rotary to wireless). What you may not realize is that with this dramatic transition, comes a fair amount of risk. Privacy for Progress With […] more…5 Things Your Organization Needs to Know About Multi-Cloud
Cloud awareness and adoption continues to grow as more enterprises take advantage of the benefits that come with multiple cloud platforms. As this trend continues its upward trajectory, we see more tech vendors coming to market with new tools designed to address a variety of different challenges. Whether you are switching up your multi-cloud strategy […] more…The Top 3 Reasons to Integrate DLP with a Cloud Access Security Broker (CASB)
Companies of all sizes are adopting cloud-based services, such as Microsoft Office 365, as a way to give their end-users greater flexibility and easier access to core business applications. This requires corporate IT departments to reexamine their current data security posture, including Data Loss Prevention policies to better monitor and control sensitive data that are […] more…It’s Time to Look Differently at Device Security
It’s easy to write blogs about the challenges we face in our industry. They are pretty easy to name – fragmentation, complexity, the need for a holistic defense strategy that is cohesively managed. As the sprawl of new types of connected devices widens, the challenge of protecting them seems to only grow more complicated. But […] more…5 Tips To Protect Your IoT Devices
Do you think as yourself as living in a “smart home”? If you look around you may notice that you are surrounded by internet-connected, computing devices, including IP cameras, speakers, doorbells, and even refrigerators. These physical products embedded with electronics and software are generally referred to as the Internet of Things (IoT). IoT products differ […] more…You vs. the Internet: 5 Hands-On Ways to Begin Safeguarding Your Family’s Privacy
Data mining. Privacy breaches. Malicious third parties. Do you ever feel like these scary sounding, albeit significant, concerns got left at the curb somewhere between carpool duty, doctor appointments, and trying to hit two softball games and a track meet in the same day? You are far from alone. If asked, most of us would […] more…Despite Decline in Use of Adobe Flash, Vulnerabilities Will Continue to Cause Concern
This post was researched and written with the assistance of Tim Hux, Abhishek Karnik, Asheer Malhotra, and Steve Povolny McAfee Advanced Threat Research team analysts have studied Adobe Flash Player for years because it is a popular target for attacks. As always, we advise customers to remain current with McAfee’s latest DAT versions. In this […] more…Change is Good When It’s Free, Easy, and Has a Happy Endpoint
When a company announces a new version of something I rely upon in my personal life, like Apple announcing a new iPhone, I cringe. Of course, the thought of the latest and best is exciting, but the thought of upgrading – the cost, the hassle – usually makes me wait (longer than my teenage son would like). […] more…Microsoft Publishes Bi-annual Security Intelligence Report (SIR)
Microsoft’s 23rd bi-annual Security Intelligence Report (SIR) focuses on three topics: the disruption of the Gamarue (aka Andromeda) botnet, evolving hacker methodologies, and ransomware. It draws on the data analysis of Microsoft’s global estate since February 2017, including 400 billion email messages scanned, 450 billion authentications, and 18+ billion Bing webpage scans every month; together […] more…Using the Internet as a Medium For Women To Break The Glass Ceiling
“You know, the internet has done wonders for my business,” said a lady baker to me, beaming at all the appreciation coming her way from happy guests at a party she was catering. “How so?” I asked. “When I started out as a home baker, it was all word of mouth as far as advertisement […] more…More information
- The Upload: Your tech news briefing for Monday, January 26
- Critical Patch Tuesday bulletin addresses Microsoft Office attack seen in the wild
- Gorgeous glass objects created with a 3D printer
- EBay faces class action suit over data breach
- 6 myths CEOs believe about security
- BE2 Custom Plugins, Router Abuse, and Target Profiles
- Microsoft Excel CVE-2018-8636 Remote Code Execution Vulnerability
- Dick Cheney Altered Heart Implant to Thwart Wireless Hackers
- Many Phoenix Contact PLCs Still Vulnerable Months After Researcher Issues Warning
- TransUnion Acquires Identity Security Company Sontiq for $638 Million