Featured Blogs
Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide
McAfee Advanced Threat Research analysts have uncovered a global data reconnaissance campaign assaulting a wide number of industries including critical...
Security Calling: Celebrate National Telephone Day by Securing Your Mobile Devices
April 25 – otherwise known as National Telephone Day – rolls around once a year to remind us of the...
Game Over! Malicious Minecraft Character Skins Infect Over 50,000 Accounts
Video games allow users to become a whole new persona, to experience imaginary worlds, and live out scenarios that are...
You vs. the Internet: 5 Hands-On Ways to Begin Safeguarding Your Family’s Privacy
Data mining. Privacy breaches. Malicious third parties. Do you ever feel like these scary sounding, albeit significant, concerns got left...
Casino’s High-Roller Database Compromised by a Single IoT Thermometer
It’s no secret that IoT devices have caused some issues with security in the past. They’ve been used by cybercriminals...
Despite Decline in Use of Adobe Flash, Vulnerabilities Will Continue to Cause Concern
This post was researched and written by Brook Schoenfield with the assistance of Tim Hux, Abhishek Karnik, Asheer Malhotra, and...
Cloud Clustering Vulnerable to Attacks
The authors thank John Fokker and Marcelo CaroVargas for their contributions and insights. In our upcoming talk at the Cloud...
Service Provider [24]7.ai Breached, Leaked Customer Data from Delta Airlines, Sears, Kmart
A huge part of modern-day customer service is the chat functionality, which allows customers to converse easily with representatives of...
Parasitic Coin Mining Creates Wealth, Destroys Systems
The increasing popularity of cryptocurrencies has inspired some people to pursue coin mining, essentially making money online. (Mining is the...
DNS – the Blind Spot in Your Security Ecosystem
It’s 10 a.m. on a Tuesday morning, and the company’s IT hero sits at her desk… “Firewall… check, anti-virus… check,...