McAfee Honors Dr. Martin Luther King Jr. Day
On Monday, January 21, McAfee will join millions across the globe to recognize the life and legacy of Dr. Martin Luther King Jr. To honor the achievements of Dr. King, our McAfee African-Heritage Community (MAHC) members recently shared memorable lines from King’s iconic “I Have a Dream” speech that he delivered at the Lincoln Memorial […] more…That’s a Wrap! Read the Top Technology Takeaways From CES 2019
The sun has finally set on The International Consumer Electronics Show (CES) in Las Vegas. Every year, practically everyone in the consumer electronics industry comes from all over to show off the latest and greatest cutting-edge innovations in technology. From flying taxis, self-driving suitcases, and robots that will fold your laundry, CES 2019 did not […] more…“League of Legends” YouTube Cheat Links: Nothing to “LOL” About
If you’re an avid gamer, you’ve probably come across a game that just seems impossible to complete. That’s because, thanks to the internet, it’s so simple to look for cheats to games on YouTube to help you level up. Most cheats exist in the form of software patches that execute files in order to activate […] more…Update now! WordPress sites vulnerable to WooCommerce plugin flaw
Researchers have published details of a dangerous flaw in the way the hugely popular WooCommerce plugin interacts with WordPress that could allow an attacker with access to a single account to take over an entire site. more…Announcing McAfee’s Evolved Consumer Product Portfolio
Every fall the leaves change colors, sweaters replace sundresses, and new changes are afoot. Especially for us at McAfee. In fact, we’re announcing quite a few changes to our consumer security portfolio this fall. Tailored to the increasingly connected world we live in, our evolved line of products focuses on better performance, better ransomware protection, […] more…We know what your kids did this summer
For many kids and teenagers, summer is all about ditching school books in favor of hobbies and fun. Every year we release a report on children’s interests, as reflected in their online activity. This summer, we investigated what they prefer in their free time. The Parental Control module in Kaspersky Lab products protects children from […] more…Examining Code Reuse Reveals Undiscovered Links Among North Korea’s Malware Families
This research is a joint effort by Jay Rosenberg, senior security researcher at Intezer, and Christiaan Beek, lead scientist and senior principal engineer at McAfee. Intezer has also posted this story. Attacks from the online groups Lazarus, Silent Chollima, Group 123, Hidden Cobra, DarkSeoul, Blockbuster, Operation Troy, and 10 Days of Rain are believed to […] more…The Reddit Data Breach: What Consumers Need to Know
With the tagline, “giving you the best of the internet in one place,” Reddit is a popular website designed for discussion, news aggregation, and the creation of social content. Boasting over 330 million users, the platform is characterized by an engaged community. Which also means it contains treasure troves of consumer data. Unfortunately, there’s now […] more…What Parents Need to Know About the Popular App Mappen
Kids love their apps but in their excitement to download the new ones, app safety often falls straight off their radar. One of those new, fun, not-so-safe apps is Mappen. Kids, pre-teens specifically, are jumping on Mappen to connect with friends nearby and, as the app’s tagline encourages, “Make Things Happen.” The location-based app allows […] more…The Exactis Data Breach: What Consumers Need to Know
There are data breaches, and then there are data breaches. For example, who could forget the Equifax data breach, which compromised the personal information of over half of the citizens of the United States? And now, a breach of similar magnitude has emerged, as a security researcher has discovered that marketing firm Exactis’ database was […] more…Another Potential MuddyWater Campaign uses Powershell-based PRB-Backdoor
by Michael Villanueva and Martin Co (Threats Analysts) The MuddyWater campaign was first sighted in 2017 when it targeted the Saudi government using an attack involving PowerShell scripts deployed via Microsoft Office Word macro. In March 2018, we provided a detailed analysis of another campaign that bore the hallmarks of MuddyWater. In May 2018, we […] more…I know where your pet is
Kaspersky Lab’s many years of cyberthreat research would suggest that any device with access to the Internet will inevitably be hacked. In recent years, we have seen hacked toys, kettles, cameras, and irons. It would seem that no gadget has escaped the attention of hackers, yet there is one last bastion: “smart” devices for animals. […] more…Trivia Time: Test Your Family’s Password Safety Knowledge
Passwords have become critical tools for every citizen of the digital world. Passwords stand between your family’s gold mine of personal data and the entirety of the internet. While most of us have a love-hate relationship with passwords, it’s beneficial to remember they do serve a powerful purpose when created and treated with intention. But […] more…Casino’s High-roller Database Compromised by a Single IoT Thermometer
It’s no secret that IoT devices have caused some issues with security in the past. They’ve been used by cybercriminals to topple networks and hack into homes. Oh, and now breach casinos. You heard correctly – a vulnerable IoT thermometer, which was being used to monitor the water of an aquarium in a casino’s lobby, […] more…Not Only Botnets: Hacking Group in Brazil Targets IoT Devices With Malware
Instances involving compromised devices, botnets, and vulnerabilities have become ordinary occurrences. This makes sense given the increased connectivity today, but ask yourself: What is the most common internet-of-things (IoT) device across network infrastructures, whether in homes or businesses? Answer: the router. Even before the term IoT was coined, we had the routers at the gateway, […] more…Uncovering Unknown Threats With Human-Readable Machine Learning
Dr. Marco Balduzzi, Senior Researcher, Forward-Looking Threat Research Team Aided by machine learning, we analyzed data on 3 million software downloads from hundreds of thousands of internet-connected machines. In our previous blog posts for this three-part series, we explored key aspects of software downloads in the wild. We looked into the major domains from where different […] more…More information
- HP: Disabling 3rd-party ink ensures “best printing experience”
- Why Hotspot Shield’s co-founder puts privacy over profits
- CrowdStrike Recaps 2015 Threat Landscape
- Emergency Alert System devices vulnerable to hacker attacks, researchers say
- Rui Pinto: Hacker Who Targeted Football and Angola’s ‘Princess’
- CIO security lessons: Dark thinking on IoT & exploding enterprise networks
- Reuters blog platform may still be out of date despite hack
- CyanogenMod becomes commercial venture with new installer and services in pipeline
- Resolved: ISIS Outage
- June 2012 Patch Tuesday Includes Flagging for Untrusted Certificates