From text message spam on smartphones to new malware that hijacks and locks down computers, Internet threats are continually evolving. Learn how the latest online threats operate and the key steps you can take to protect your email, network, and business.
According to the report ‘Needle in a Datastack’, businesses are vulnerable to security breaches due to their inability to properly analyze or store big data.
This infographic looks at consumer attitudes toward shopping online and outlines how a security breach or the lack of a visible security policy or indicator can change a consumer’s decision to do business on a website, directly impacting an online merchant’s sales conversions.
Malicious attacks — where the only goal is to cause as much damage as possible — are expected to grow in 2013. Here are five key tips for enterprises to help mitigate the impact of these attacks aimed at breaching database and network security.
Whether you are a security professional or simply looking to learn more about online threats, McAfee researchers will guide you through the current threat landscape. Our analysis helps you understand overall threat trends, how malware and Internet threats are evolving, and which devices and payloads cybercriminals are targeting — key insights that can help you protect your business.
This infographic captures the state of malware as it stands in early 2013 and illustrates the growth of online threats, including mobile malware, signed malware, master boot record attacks, and ransomware.
The growth of mobile malware, particularly targeted at Android smartphones, shows no sign of slowing as mobile devices remain an attractive platform for cybercriminals.
Although the proliferation of botnets is slowing, botmasters will try to regain control by implementing fail-safes and hardwiring their botnets after a takedown.
Tips to protect your home computers, mobile devices, and your family’s complete digital life