Search Results

Cloud Security

272 Million Password Dump Highlights Need for Strong, Unique Passwords

With the recent password dump of 272 million email credentials including Gmail, Hotmail, Microsoft, Yahoo and Mail.ru, posted on the Darknet, security professionals are once again warnings against reusing personal email credentials with corporate accounts. While recommendations to change one’s personal email password after any such attack remain consistent, experts are also ...

McAfee Labs

A Dummies Guide to ‘Insider Trading’ via Botnet

This post, the first of two parts, was written by Raj Samani, Christiaan Beek, and Shane Shook.  Want to spread malware? One of the most effective ways is to use a botnet, a network of infected systems. The goals of botnets have barely changed since we first encountered them more ...

McAfee Labs

Hidden Data Economy Report Exposes Price Points for Stolen Data

McAfee today released The Hidden Data Economy report, which provides examples of how different types of stolen data is being packaged and offering prices for each type of data. McAfee Group’s McAfee Labs organization examined pricing for stolen credit and debit card data, bank account login credentials, stealth bank transfer ...

McAfee Labs

We’ve Been Hacked! Okay, I’ll Deal With It Next Week

That was the message I got from a CEO when we presented evidence that their organization had been compromised and the attackers had been free to roam for months, resulting in the theft of terabytes worth of data. Actually, the exact words were “So we’ve been hacked, eh? Well, it’s ...

Cloud Security

Poll: 9 Top Questions CIOs are Asking about Cloud Threat Detection

Data is moving to the cloud, but the security controls offered by cloud providers vary widely. According to Gartner, one-third of consumer data will be hosted in the cloud by 2016. McAfee’s (formerly Skyhigh Networks) own usage data shows that the average organization uploads 3.1GB of data to the cloud ...

Identity Protection

What is a Virus?

Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses, varicella replicates itself, spreading though the body, and eventually appearing as itchy red blisters all over the body. But the virus doesn’t stop there; it can spread to other people ...

Cloud Security

5 Devious Instances of Insider Threat in the Cloud

Security professionals would be remiss to neglect the human element of data security, a veritable chink in the security armor of every organization. Cloud services have magnified the potential consequences of user error or malice by facilitating the movement of data into and out of the enterprise, while also driving ...

Mobile and IoT Security

Don’t Believe These 6 Mobile Security Myths

Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don’t think it applies ...

Consumer Threat Notices

Mobile Spyware: How Hackers Can Turn Your Phone Into a Stalking Machine

In the mid-2000s a commercial advertisement achieved so much notoriety that its existence bordered on parody. The product was a headache-relieving cream called HeadOn and its advertisements told you three times to “apply it directly to the forehead.” The commercial was widely panned for its bizarre nature and lack of ...

Identity Protection

What is Browser Hijacking?

Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed  or check out The Financial Times but your homepage is now some weird search engine you’ve never seen before. Guess what? You’ve been hijacked. Browser hijacking is when your Internet browser (eg. Chrome, FireFox, ...

Subscribe to McAfee Securing Tomorrow Blogs