Teen Parties and Instagram. If your teen is keen to have a party, I can guarantee you that they will not be handing out paper invitations on the playground! It’s all done online now my friends and that means – it can get very messy. When my kids were in Primary School, I would make
If you’re an avid reader of threat trends or a fan of red team exercises, you’ve probably come across a reference to the MITRE ATT&CK framework in the last few months. If you have ever wondered what it was all about or if you’ve never heard of it but are interested in how you can
Your home screen is just a matrix of numbers. Your device loses its charge quickly, or restarts suddenly. Or, you notice outgoing calls that you never dialed. Chances are your smartphone has been hacked. The sad truth is that hackers now have a multitude of ways to get into your phone, without ever touching it.
In my last piece, I broke down the who, what, and how of cyberbullying, as most people are unaware of how the problem actually takes a variety of forms. With multiple types of cyberbullies and methods for digital bullying impacting kids today, the phenomenon’s effect on society is nothing short of powerful. In fact, according
Rejection is the unspoken risk that is present when we enter into any relationship be it a friendship or a love relationship. It’s a painful, inescapable part of life that most of us go to great lengths to avoid. That said, there’s a social media phenomenon called “ghosting” that can take the pain of rejection to
We are excited to announce that McAfee has been recognized as a 2018 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms. McAfee takes great pride in this distinction, as we feel that real-world feedback from our customers is the driving force behind the recognition and that they have spoken loudly about the value they
Rockstar Games’ Red Dead Redemption 2 has struck a popular chord with many online gamers. Unfortunately, the Western-themed action-adventure game has also become a popular vessel for malicious activity among cybercriminals as well. Scammers are tricking gamers into giving up their personal information with phony “free” downloads of the online game, while simultaneously making a
For the past 18 months, McAfee Labs has been investigating a pay-per-install developer, WakeNet AB, responsible for spreading prevalent adware such as Adware-Wajam and Linkury. This developer has been active for almost 20 years and recently has used increasingly deceptive techniques to convince users to execute its installers. Our report is now available online. During
We all share photos online: photos of our kids, photos of our trips, and photos of our meals. We think we are sharing memorable experiences with our friends and family, but are we sharing more with the public than we intend? What if hidden metadata could reveal dangerous details? In episode 20 of “Hackable?”, a
Pay-per-install, or PPI for short, is a type of software program that presents users with third-party offers while they are in the middle of another download. If a user clicks on the third-party advertisement, the software developer earns money from the download. One specific PPI program has caught the attention of our McAfee ATR team,
There’s pressure — lots of pressure. And not the typical I-want-a-bike or a doll-that-poops kind of pressure your kids may have foisted upon you just a few Christmases ago. No, this is the big leagues. Your child wants his or her first smartphone to show up under the tree this year. Is your son or daughter
It’s common for people to share their personal information with companies for multiple reasons. Whether you’re checking into a hotel room, using a credit card to make a purchase at your favorite store, or collecting rewards points at your local coffee shop, companies have more access to your data than you may think. While this
These predictions were written by Eoin Carroll, Taylor Dunton, John Fokker, German Lancioni, Lee Munson, Yukihiro Okutomi, Thomas Roccia, Raj Samani, Sekhar Sarukkai, Dan Sommer, and Carl Woodward. As 2018 draws to a close, we should perhaps be grateful that the year has not been entirely dominated by ransomware, although the rise of the GandCrab
Many music-lovers around the world use Spotify to stream all of their favorite tunes. While the music streaming platform is a convenient tool for users to download and listen to their music, hackers are capitalizing on the company’s popularity with a recent phishing campaign. The campaign lures users into giving up their account details, putting
If your organization is, you can win on a couple fronts… In traditional warfare, information sharing is key. The notion of sharing insight on your opponent is extremely valuable and cannot be underestimated. The basic principles in Sun Tzu’s The Art of War state you must know yourself and know your opponent to be successful.
Black Friday and Cyber Monday mark the unofficial kickoff to the holiday shopping season. In anticipation of the busiest time of year for e-commerce, this year we conducted the Stressed Holiday Online Shopping survey to understand how financial pressure can impact buyer behavior when it comes to online purchasing and cybersecurity. The economic burden of the
It’s officially the most wonderful time of the year — no doubt about it. But each year, as our reliance and agility on our mobile devices increases, so too might our impulsivity and even inattention when it comes to digital transactions. Before getting caught up in the whirlwind of gift giving and the thrill of
The internet has allowed society to stay connected in more ways than ever before. We can speak to strangers across the globe, connect with loved ones in an instant, and share our lives publicly. As much as the internet has connected us in positive, eye-opening ways, its interactive nature has also created a new problem
In October, I was privileged to attend the two-day MITRE ATT&CK™ conference, where participants and attendees voiced their support for the ATT&CK framework. The event, sponsored by McAfee, served as a forum for sharing insights and best practices for using ATT&CK as a way to describe and demystify the complexities of today’s cyberattacks. MITRE is
It could happen to any of us. One minute your laptop is sitting on a coffeehouse table or going through airport security, the next it’s gone. Your personal files are all locked behind a strong password, but is that enough to keep off prying eyes? In episode 19 of “Hackable?”, Geoff ships his laptop 1,000
The authors thank their colleagues Oliver Devane and Deepak Setty for their help with this analysis. McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies. Coin mining malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background
If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers would vary widely. Each team views the definition based on their own requirements, but the one answer that most likely won’t appear is: “To protect data.” Traditionally, database security has always been seen as a
Holiday stress. Every year, come November, my resting heart rate starts to rise: the festive season is approaching. Not only is there so much to do but there’s so much to spend money on. There are presents to purchase, feasts to prepare and party outfits to buy. Throw in a holiday to fill the long
At the end of last year, a survey revealed that the most popular password was still “123456,” followed by “password.” These highly hackable choices are despite years of education around the importance of password security. So, what does this say about people who pick simple passwords? Most likely, they are shooting for a password that is
You aren’t going to like this post. However, you will, hopefully, find yourself nodding and perhaps, even making some changes because of it. Here it friends: That love-hate relationship you have with your smartphone may need some serious attention — not tomorrow or next week — but now. I’m lecturing myself first by the way.
If you’re a gamer, you know how important virtual currency is. It allows you to purchase new costumes and weapons to personalize your avatar. But how does one go about gaining virtual currency? Players complete in-game challenges and are rewarded with coins to spend in their virtual world. These challenges can be pretty difficult and
The Americas Partner Summit 2018 was held on Tuesday, October 16 at MPOWER Cybersecurity Summit. It was a day filled with McAfee and partner leadership coming together to collaborate on McAfee’s partner strategy, product portfolio, programs, and more. Here are some of the highlights: The Audience 338 partners 225 VAR, Disti, MSP, etc. 35 OEM
Cryptocurrency mining is the way transactions are verified and added to the public ledger, a database of all the transactions made around a particular piece of cryptocurrency. Cryptocurrency miners compile all of these transactions into blocks and try to solve complicated mathematical problems to compete with other miners for bitcoins. To do this, miners need
With just days until Black Friday, the unofficial kick off to the holiday shopping season is quickly approaching. In anticipation of the busiest time of year for e-commerce, this year we conducted a survey, Stressed Holiday Online Shopping, to understand how financial pressure can impact buyer behavior when it comes to online purchasing and cybersecurity.
Ahmad, Software Architect Hailing from a small town in India, school for me was largely a means to an end. Rather than a chance to explore and cultivate my own interest, education was a path to a degree that could be used to obtain a steady and respectable career. Throughout my childhood, however, I was