Please turn on your JavaScript for this page to function normally.
employee
While on vacation, users continue to prioritize convenience over security

Despite the benefits experienced from unplugging, most individuals prefer to stay connected. Fifty-two percent of U.S. respondents indicated that they spend at least an hour a …

Word malware
MS Office zero-day exploited in attacks – no enabling of macros required!

A new zero-day flaw affecting all versions of Microsoft Office is being exploited in attacks in the wild, and no user is safe – not even those who use a fully patched …

abstract
Threat intelligence sharing challenges: Understand the context of cyber events

A new McAfee report details the challenges facing threat intelligence sharing efforts. The growing complexity of the technology environment is a very important driver for …

bot
Video: TinyNuke botnet explained

In the videos below, McAfee Labs show the setup requirements for installing and deploying TinyNuke. They review the available features of TinyNuke through the control panel, …

smile
15 new ransomware decryption tools added to No More Ransom

Nine months after the launch of the No More Ransom (NMR) project, an ever-growing number of law enforcement and private partners have joined the initiative, allowing more …

McAfee
Intel Security officially becomes McAfee again

McAfee has begun operating as a new standalone company. The launch of McAfee marks the closing of the previously announced investment by TPG and Intel Corporation (INTC) to …

attack
McAfee Virus Scan Enterprise opens Linux machines to remote attackers

Security researcher Andrew Fasano has discovered a multitude of vulnerabilities in McAfee Virus Scan Enterprise product for Linux – vulnerabilities that can be chained …

escalator
McAfee Labs predicts 14 security developments for 2017

Intel Security released its McAfee Labs 2017 Threats Predictions Report, which identifies 14 threat trends to watch in 2017. “To change the rules of the game between attackers …

Lock
How much is your privacy worth?

How much is your privacy worth? Take for example your bank account number, sort code, name, and address. Is it worth more than £25? Well I think that it is and as a result I …

tunnel
Which celebrities generate the most dangerous search results?

Female comedian Amy Schumer knocked DJ Armin van Buuren off of the list to become the most dangerous celebrity to search for online, according to Intel Security. Now in its …

danger
The dynamics of mobile app collusion and malicious activities

Mobile app collusion happens when cybercriminals manipulate two or more apps to orchestrate attacks on smartphone owners. McAfee Labs has observed such behavior across more …

Bitcoin
Blockchain transactions create risks for financial services

Trust is the most valuable commodity in the digital age. Failure to trust the systems or organizations in which we place our digital assets leads us to look at alternate …

Don't miss

Cybersecurity news