Securing Tomorrow. Today.

RSA 2020 – See You There!

There’s a lot to look forward to at RSA 2020, so be sure to stop by booth #N-5745 in the North Hall for demos, theater sessions, and more.

Read Blog
Family Safety

TikTok Challenge, Hoop App, and Other Headlines You May Have Missed

Digital news that affects families seems to be dominating the headlines these days. To keep parents in the know, here are some of the stories you may want to give extra family discussion time to this week. Skull Breaker Challenge Proving Unfunny  Apps — video apps especially — can help ...

McAfee Labs

CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II

In our first article we discussed the growing pattern of targeted ransomware attacks where the first infection stage is often an info-stealer kind of malware used to gain credentials/access to determine if the target would be valuable for a ransomware attack. In this second part we will pick up where ...

McAfee Labs

Model Hacking ADAS to Pave Safer Roads for Autonomous Vehicles

The last several years have been fascinating for those of us who have been eagerly observing the steady move towards autonomous driving. While semi-autonomous vehicles have existed for many years, the vision of fleets of fully autonomous vehicles operating as a single connected entity is very much still a thing ...

McAfee Labs

Introduction and Application of Model Hacking

Catherine Huang, Ph.D., and Shivangee Trivedi contributed to this blog. The term “Adversarial Machine Learning” (AML) is a mouthful!  The term describes a research field regarding the study and design of adversarial attacks targeting Artificial Intelligence (AI) models and features.  Even this simple definition can send the most knowledgeable security ...

Consumer Threat Notices

Consumers want a fully connected life – but at what cost?

Convenience has always, and will always be king. That’s why it’s no surprise that the average person is collecting connected devices left and right and is expected to own 15 connected devices by 2030. While they vary from person to person, recent research shows that the most popular connected devices ...

Family Safety

Timeless Principles to Help Your Child Develop Social Superpowers

“You can make more friends in two months by becoming interested in other people than you can in two years by trying to get other people interested in you.” ~ Dale Carnegie Each year it’s my tradition to re-read a handful of books that continue to shape my perspective. One ...

Consumer Identity Protection

How You (and Your Teen) Can Stay Safe While Looking for Love Online

Valentine’s Day is such a double-edged sword. If you’re feeling the love and just can’t get enough of your sweetheart – then I wish you a wonderful day. If, on the other hand, you are unattached and feeling a little lonely then chances are you’re thinking about trying your luck ...

Consumer

Watch Out For IRS Scams and Avoid Identity Theft

It’s time to get those W-2 and 1099 tax forms ready. On January 27th, the IRS began accepting paper and electronic tax returns ahead of the April 15th due date. But as users prepare to file, scammers prepare to take advantage of innocent taxpayers with malicious tactics, looking to harvest ...

McAfee Labs

CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I

For many years now I have been working and teaching in the field of digital forensics, malware analysis and threat intelligence. During one of the classes we always talk about Lockard’s exchange principle: “with contact between two items, there will be an exchange”. If we translate that to the digital ...

McAfee Labs

Knock, Knock – Who’s There?

A Windows Linux Subsystem Interop Analysis Following our research from Evil Twins and Windows Linux Subsystem, interoperability between different WSL versions was something that caught our attention. The protocol and mechanism to do file management from/to WSL is a must for Blue and Red Teams whose research will provide new ...

Subscribe to McAfee Securing Tomorrow Blogs