What’s the use of a privacy policy?
In 2012 it was reported that “16% of Internet users claim to always read privacy policies of the sites and online services with which they share their private …
Motivation roulette: Is pseudo-ransomware a term?
It used to be so simple. Attack campaigns were relatively simple to determine, for example when we detailed the recent Shamoon campaign it was clear that this was intended to …
McAfee aims to strengthen human-machine defense teams
“Today’s security teams are facing 244 new cyber threats every minute, amid a serious talent shortage. Siloed security, without automation, managed by overwhelmed teams is not …
Secrets of successful threat hunters and SOCs
McAfee has polled over 700 IT and security professionals from a diverse set of countries, industries, and organization sizes about the role of threat hunting and the evolution …
While on vacation, users continue to prioritize convenience over security
Despite the benefits experienced from unplugging, most individuals prefer to stay connected. Fifty-two percent of U.S. respondents indicated that they spend at least an hour a …
MS Office zero-day exploited in attacks – no enabling of macros required!
A new zero-day flaw affecting all versions of Microsoft Office is being exploited in attacks in the wild, and no user is safe – not even those who use a fully patched …
Threat intelligence sharing challenges: Understand the context of cyber events
A new McAfee report details the challenges facing threat intelligence sharing efforts. The growing complexity of the technology environment is a very important driver for …
Video: TinyNuke botnet explained
In the videos below, McAfee Labs show the setup requirements for installing and deploying TinyNuke. They review the available features of TinyNuke through the control panel, …
15 new ransomware decryption tools added to No More Ransom
Nine months after the launch of the No More Ransom (NMR) project, an ever-growing number of law enforcement and private partners have joined the initiative, allowing more …
Intel Security officially becomes McAfee again
McAfee has begun operating as a new standalone company. The launch of McAfee marks the closing of the previously announced investment by TPG and Intel Corporation (INTC) to …
McAfee Virus Scan Enterprise opens Linux machines to remote attackers
Security researcher Andrew Fasano has discovered a multitude of vulnerabilities in McAfee Virus Scan Enterprise product for Linux – vulnerabilities that can be chained …
McAfee Labs predicts 14 security developments for 2017
Intel Security released its McAfee Labs 2017 Threats Predictions Report, which identifies 14 threat trends to watch in 2017. “To change the rules of the game between attackers …
Featured news
Resources
Don't miss
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams
- CERT-UA warns against “security audit” requests via AnyDesk