News of the Royal Birth is a Goldmine for Spammers
Breaking news, no matter how wonderful or horrible it may seem, can be a breeding ground for scams, especially on the Internet. Just as ticket scalpers look to make a profit off concerts and sporting events, scammers are looking to take advantage of people on the hunt for the exclusive scoop in big name news. […] more…Spy? Where? Mobile Spyware Hiding Right Under Your Nose
Some days it feels like the whole world is going mobile. We tweet, we text, we browse the world from small devices that fit into our hands. People from across the globe can reach out to each other with one message. You can buy a plane ticket while on the bus. There are apps that […] more…Researchers reveal methods behind car hack at Defcon
Two security researchers at Defcon on Friday revealed the methods they used to hack into car computers and take over the steering, acceleration, breaks and other important functions. read more more…Stop Malvertisements from Causing a Click-tastrophe on Your Computer
Web ads: sometimes annoying, other times entertaining and useful, but for the most part, harmless. Or so you thought. It seems that cybercriminals are now turning their attention toward pulling you in with a strong sales message, and you may be none the wiser until it’s too late. Your neighborhood hacker has decided to start […] more…OWASP: The Best Web App Security Resource On The Internet
James Bond is known for having it all: fast cars, the latest spy gizmo, and the smug smirk which lets the audience know that he’ll always come out on top in the end. Web developers can, at times, be a lot like Bond: they can buy fast cars and, thanks to their respective industries, take […] more…Malware hijacks Twitter accounts to send dangerous links
Twitter users in the Netherlands are being targeted by a piece of malware that hijacks their accounts, according to security vendor Trusteer. read more more…New version of Gozi financial malware bundles MBR rootkit
Researchers from security firm Trusteer have found a new variant of the Gozi banking Trojan program that infects a computer's Master Boot Record (MBR) in order to achieve persistence. read more more…McAfee Online Safety for Kids recognized as a 2013 Computerworld Honors Laureate
I am STOKED that IDG’s Computerworld Honors Program today recognized the McAfee Cares – Online Safety for Kids program as a 2013 Laureate. The annual award program honors visionary applications of information technology promoting positive social, economic and educational change. The Computerworld Honors Program awards will be presented at the Gala Evening and Awards Ceremony on […] more…Risky Mobile Applications Plague Users
Once you own a smartphone or tablet, you are not likely to give it up. But it is essential that you can understand where the risks are and steer around them as you enjoy your mobile digital life. With the growth in mobile exploding, it is only natural for cybercriminals to move towards that device […] more…Shady Surfing: Online Ads 182x More Likely than Adult Websites to Infect Your PC
Wait…what! You heard it right: According to a recent security report, Internet users are 182 times more likely to get a virus from clicking on online ads than visiting an adult website. At first glance, this sounds extremely counterintuitive (and it is). In theory, wouldn’t your risk go up when visiting shady sites? Yes and […] more…Observations on the Evolution of Cyber Tactics in 2013
“There is one thing stronger than all the armies in the world, and that is an idea whose time has come.” – Victor Hugo The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that […] more…Facebook Spam Leverages, Abuses Instagram App
The downside of popularity is that cybercriminals tend to abuse it for their own nefarious ends. Case in point, social networking sites have been often used to proliferate malware. Just recently, we spotted a Facebook clickjacking attack that leverages and abuses Instagram to point users to malicious websites. Users encounter this threat by being tagged […] more…4 Ways to Protect Your Medical Information from Healthcare Fraud
Winter is upon us, and with it comes the dreaded flu season. In turn, this means more trips to the doctor’s office and the potential for high medical bills – a monetary incentive that fraudsters have not overlooked. According to the FBI, healthcare fraud costs the United States an estimated $80 billion a year, with […] more…Guard Against Sandbox-Bypassing Adobe Reader Zero-Day
News of the ‘unknown’ and underground zero-day in Adobe Reader is all over the place. Because of its supposed noteworthy features, including the capability to defeat Adobe’s sandbox feature, users are alarmed – and rightfully so. But the situation is not without hope. With this entry, my aim is to explain to our customers what […] more…Keep Your Children Safe Online
It’s a parent’s responsibility to ensure that wherever their children are, they remain safe, happy and secure. The Internet, in this respect, is no different than any other playground in the park or at school. It looks harmless, even magical at first glance, but could result in some spills and tears if kids are left […] more…A better reason not to use Huawei routers: Code from the ’90s
Security researcher Felix "FX" Lindner has a more compelling reason to steer clear of routers from Huawei Technologies than fears about its ownership. read more Incoming search termsTeer celog more…More information
- Microsoft Windows ‘HTTP.sys’ CVE-2018-8231 Remote Code Execution Vulnerability
- Do you find passwords too darn hard? Then poetry’s your hidden card!
- 300,000 Impacted by Data Breach at Car Rental Firm Avis
- Click2Gov Attacks on U.S. Cities Attributed to Previously Unknown Group
- Adobe Patches 13 Vulnerabilities in Illustrator
- EU calls on US to rebuild trust in post-Snowden era
- EFF Warns Police, Courts About Unreliability of IP Addresses
- Skype talks back to critics on security and privacy
- Cyber Espionage Targets Interests in South China Sea
- FTC Proposes Strengthening Children’s Online Privacy Rules to Address Tracking, Push Notifications