Securing Tomorrow. Today.

How McAfee Can Help You Scale Security to Employees Working from Home

We’re in a moment of rapid change for our IT environments. As companies shift from working in an office within their controlled network to working from home, many are finding that the architectures they have in place aren’t ready for the scalability and security challenges of a decentralized workforce.

Read Blog
McAfee Labs

Emerging ‘Stack Pivoting’ Exploits Bypass Common Security

[This blog was primarily written by Xiaoning Li of McAfee Labs, with assistance from Peter Szor of McAfee Labs.] In February 2013, the Adobe Product Security Incident Response Team (PSIRT) released security advisory APSA13-02. In that report they listed two vulnerabilities (CVE-2013-0640 and CVE-2013-0641) that were widely exploited. At McAffee ...

Family Safety

Cybercasing – How Sharing Your Pics, Videos and Status Updates Can Get You Into Trouble

It can be fun ‘checking in’ at your favourite restaurant on Facebook, sharing pics of your hotel room on Instagram or buying and selling items on eBay. In fact – it can give you quite a buzz. But did you know that ‘geotagging’ (sharing your location via your pics or ...

Consumer Threat Notices

Visualizing A DDoS Cyber Attack

A denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated through the hacker’s botnet, or network of infected computers. Usually, when a cybercriminal launches a DDoS attack on a website, there isn’t much for a user like you or me ...

McAfee Labs

Tracking PDF Usage Poses a Security Problem

Update on May 2 Adobe has confirmed this vulnerability and has scheduled a patch release for May 14.   Looking back this year’s RSA Conference, you might have the feeling that the current threat landscape is primarily a series of advanced attacks. This concept includes well-known advanced persistent threats (APTs) ...

Consumer Threat Notices

Are Google and Bing Serving You Safe Search Results?

New research has concluded that despite best efforts to keep search results clean, Google and Bing often serve malware-infected sites among their top search results. This malware (or malicious software) can include sites infected with viruses, Trojans, computer worms, and more, making it extremely important for consumers to pay close ...

McAfee Labs

Travnet Botnet Steals Huge Amount of Sensitive Data

In a McAfee Labs blog by my colleague Vikas Taneja last month, he discussed high-level functioning in the malware Travnet. Since then we have continued to analyze different samples and now classify Travnet as a botnet rather than a Trojan because of the presence of control code, and the malware’s ...

Consumer Threat Notices

Smartphone Shopping 101: Are Mobile Devices Less Secure than PCs?

According to a recent survey, nearly half of all consumers believe that their smartphones and other mobile devices are less secure than their laptop or desktop computers.  In the same survey, only 36% of respondents said they trust online retail sites to keep their personal data safe. Still, holiday shopping ...

Mobile and IoT Security

Don’t Want to Read Through the Fine Print? There’s an App for That

We’ve always been told to “read the fine print before you sign on the dotted line,” but let’s be frank. In today’s digital world, all we want to do is play that new game, test that new app and hear that new song. The fine print seems like an unnecessary ...

Family Safety Identity Protection Mobile and IoT Security

What is malware and why should I be concerned?

“Malware” is a shortened version of the words malicious software. It is defined as: a generic term used to describe any type of software or code specifically designed to exploit a computer/mobile device or the data it contains, without consent. Most malware is designed to have some financial gain for ...

Mobile and IoT Security

Digital Stalking: Physical Eavesdropping on Your Mobile Device

Did you know that while you innocently play games or browse Facebook on your smartphone or tablet, someone might be tracking your every move?  Through a stream of data “leaked” by your mobile gadgets, cybercriminals can determine which direction you’re headed, how fast you’re walking and how long your strides ...

Subscribe to McAfee Securing Tomorrow Blogs