While on vacation, users continue to prioritize convenience over security
Despite the benefits experienced from unplugging, most individuals prefer to stay connected. Fifty-two percent of U.S. respondents indicated that they spend at least an hour a …
MS Office zero-day exploited in attacks – no enabling of macros required!
A new zero-day flaw affecting all versions of Microsoft Office is being exploited in attacks in the wild, and no user is safe – not even those who use a fully patched …
Threat intelligence sharing challenges: Understand the context of cyber events
A new McAfee report details the challenges facing threat intelligence sharing efforts. The growing complexity of the technology environment is a very important driver for …
Video: TinyNuke botnet explained
In the videos below, McAfee Labs show the setup requirements for installing and deploying TinyNuke. They review the available features of TinyNuke through the control panel, …
15 new ransomware decryption tools added to No More Ransom
Nine months after the launch of the No More Ransom (NMR) project, an ever-growing number of law enforcement and private partners have joined the initiative, allowing more …
Intel Security officially becomes McAfee again
McAfee has begun operating as a new standalone company. The launch of McAfee marks the closing of the previously announced investment by TPG and Intel Corporation (INTC) to …
McAfee Virus Scan Enterprise opens Linux machines to remote attackers
Security researcher Andrew Fasano has discovered a multitude of vulnerabilities in McAfee Virus Scan Enterprise product for Linux – vulnerabilities that can be chained …
McAfee Labs predicts 14 security developments for 2017
Intel Security released its McAfee Labs 2017 Threats Predictions Report, which identifies 14 threat trends to watch in 2017. “To change the rules of the game between attackers …
How much is your privacy worth?
How much is your privacy worth? Take for example your bank account number, sort code, name, and address. Is it worth more than £25? Well I think that it is and as a result I …
Which celebrities generate the most dangerous search results?
Female comedian Amy Schumer knocked DJ Armin van Buuren off of the list to become the most dangerous celebrity to search for online, according to Intel Security. Now in its …
The dynamics of mobile app collusion and malicious activities
Mobile app collusion happens when cybercriminals manipulate two or more apps to orchestrate attacks on smartphone owners. McAfee Labs has observed such behavior across more …
Blockchain transactions create risks for financial services
Trust is the most valuable commodity in the digital age. Failure to trust the systems or organizations in which we place our digital assets leads us to look at alternate …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments