Malware in Smart Factories: Top Security Threats to Manufacturing Environments
by Matsukawa Bakuei, Ryan Flores, Vladimir Kropotov, and Fyodor Yarochkin (Threat Researchers) The introduction of the use of cyber-physical systems (CPSs) in manufacturing — the revolution known as Industry 4.0 and typically embodied in so-called smart factories — is just one of the manifestations of how the industrial internet of things (IIoT) is improving processes, […] more…Telecom Crimes Against the IoT and 5G
by: Trend Micro Research and Europol’s European Cybercrime Centre (EC3) Telecommunications or telecom technology is the underpinning of the modern internet, and consequently, the internet’s growing segment, the internet of things (IoT). Likewise, the global telecommunications network we enjoy today has been greatly influenced by the existence and growth of the internet. Between telecom and […] more…The Importance of Big Data in Your Content Marketing Strategy
Among the options a brand can choose when looking to reach its customers while also pay attention to trends, content is one of the most relevant and useful techniques in 2019. As described by the PR agency GoodNoon, through diverse content presented under different formats and distributed through various platforms or media, brands make sure […] more…You Rang? New Voice Phishing Attack Tricks Unsuspecting Users
In this digital day and age, the average user is likely familiar with the techniques and avenues cybercriminals use to get ahold of personal data and money. With this knowledge, we’ve become smarter and keen to the tricks of the cybercrime trade. However, cybercriminals have become smarter too, and therefore their attacks have become more […] more…Time for VT Enterprise to step up
Late last year we announced the release of VT Enterprise for existing VT Intelligence subscribers. Since the launch, we have iterated on and improved upon VT Enterprise and it is time to begin a full deprecation of the old VT Intelligence interface. Today, we are announcing a 1 month deprecation timeline. Note that this does […] more…Your Mobile Phone: Friend or Foe?
Where would we be without our mobile phones? Our kids, boss, friends – so many people reach out to us via our mobile phone. And unfortunately, hackers have also started reaching out – in major ways. The severity of attacks on mobile devices is often underestimated. It is now common to have employees use their […] more…Preventing Cryptojacking Malware with McAfee WebAdvisor’s New Cryptojacking Blocker
By now, you’ve probably heard of cryptocurrency, but you may not know exactly what it is. To put it simply, cryptocurrencies are virtual currencies that have actual monetary value in today’s world. They are limited entries of transactions into a single database, or public ledger, that can’t be changed without fulfilling certain conditions. These transactions […] more…Rogue Drones Cause Gatwick Airport to Close for Over 30 Hours: More on This Threat
As the Internet of Things works its way into almost every facet of our daily lives, it becomes more important to safeguard the IoT devices we bring into our homes. One device that has become increasingly popular among consumers is the drone. These remote-controlled quadcopters have enhanced the work of photographers and given technology buffs […] more…Giving Your Endpoint the Gift of Security This Holiday Season
Suddenly, it’s December, and the beginning of the holiday season. Your coworkers are now distracted with getting in their PTO, flying home to be with family, and completing their shopping lists. But the holiday season isn’t always filled with cheer, it’s got some scrooges too – cybercriminals, who hope to take advantage of the festive […] more…New PowerShell-based Backdoor Found in Turkey, Strikingly Similar to MuddyWater Tools
MuddyWater is a well-known threat actor group that has been active since 2017. They target groups across Middle East and Central Asia, primarily using spear phishing emails with malicious attachments. Most recently they were connected to a campaign in March that targeted organizations in Turkey, Pakistan, and Tajikistan. The group has been quite visible since the […] more…McAfee Labs 2019 Threats Predictions Report
These predictions were written by Eoin Carroll, Taylor Dunton, John Fokker, German Lancioni, Lee Munson, Yukihiro Okutomi, Thomas Roccia, Raj Samani, Sekhar Sarukkai, Dan Sommer, and Carl Woodward. As 2018 draws to a close, we should perhaps be grateful that the year has not been entirely dominated by ransomware, although the rise of the GandCrab […] more…State County Authorities Fail at Midterm Election Internet Security
One of the things we at McAfee have been looking at this midterm election season is the security of election infrastructure at the individual county and state levels. A lot of media and cybersecurity research focus has been placed on whether a major national attack could disrupt the entire U.S. voting infrastructure. Headlines and security […] more…Phishing Campaign uses Hijacked Emails to Deliver URSNIF by Replying to Ongoing Threads
by Erika Mendoza, Anjali Patil and Jay Yaneza While most phishing campaigns are fairly simplistic in nature and easy to spot (they usually involve a legitimate-looking email, often with a malicious attachment or link embedded in the text), a spam campaign we observed in September indicates attackers are angling towards a more sophisticated form of phishing. […] more…A Culture of Security is Built on a Strong First Line of Defense
With the pressure of digital transformation on companies today, executives need to consider how to keep their organization safe amidst rapid change. Most businesses cover their security bases with the basics: advanced analytics, technology using machine-learning and AI, and baseline protocols. But in the face of today’s rising threats, the basics may not be enough. […] more…Train your Cybersecurity Team for Peak Performance
Whether you’re racing to fill cybersecurity jobs to keep up with the changing threat landscape or support your company’s rapid growth, getting your team trained and at the top of their game is a high priority. You need to ensure all new hires are operating with the same baseline of knowledge and skills as your […] more…A Strategic Approach to Retention Helps Build Sustainable Cybersecurity Teams
The demand for cybersecurity talent is outpacing supply across the entire business landscape. Depending on what research you reference, experts predict that by 2020 there will be around 1.5 million to 2 million cybersecurity roles unfilled. This makes employee retention more important than ever before to ensuring the stability and security of your organization. When […] more…More information
- Curious people can’t resist plugging in random flash drives
- AI can crack most password in less than a minute
- Microsoft Edge CVE-2016-3377 Scripting Engine Remote Memory Corruption Vulnerability
- Cyberflasher Airdrops rude images to victim’s iPhone
- TV hacks: New front in info-wars
- Data Breach at Independent Living Systems Impacts 4 Million Individuals
- India’s white hats lead the world at breaking Facebook
- Poland to Launch Cyberspace Defense Force
- ID theft puppet master convicted of huge tax refund scam
- Mozilla Warns of Fake Thunderbird Downloads Delivering Ransomware