Securing Tomorrow. Today.

How McAfee Can Help You Scale Security to Employees Working from Home

We’re in a moment of rapid change for our IT environments. As companies shift from working in an office within their controlled network to working from home, many are finding that the architectures they have in place aren’t ready for the scalability and security challenges of a decentralized workforce.

Read Blog
McAfee Labs

Fighting Mobile Phone Impersonation and Surveillance

Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased a number of flaws and solutions in GSM mobile phone networks. Day 1 Defeating GSM encryption is not new. Nohl and Melette detailed how attackers can use known network control ...

Cloud Security

20 Questions to Ask Your Cloud Provider

As soon as you contract with a cloud provider, you should be concerned not only with your IT security but the provider’s as well. If you’re a small or medium-sized business you may assume the provider’s security is superior to your own, and you might be right, but make sure ...

McAfee Labs

Inside Adobe Reader Zero-Day Exploit CVE 2011-2462

Recently a critical vulnerability has been identified in Adobe Reader X and Adobe Acrobat X Versions 10.1.1 and earlier for Windows and Mac OS, Reader 9.4.6 and Reader 9.x Versions for Unix. This zero-day vulnerability (CVE-2011-2462) could allow an attacker to execute arbitrary code and silently take the control of a victim’s ...

McAfee Labs

ZeroAccess Rootkit Launched by Signed Installers

Digital certificates and certificate authorities have been much in the news recently. Attacks–such as those used by Stuxnet, Duqu, and other malware–involving stolen certificates show an increasingly worrisome new security trend. Certificate authorities have been targeted several times in the recent past with some success. There is a large chunk ...

McAfee Labs

French Magazine Suffers Web Hack, Firebombing

To celebrate the recent victory of the Tunisian Islamist party, the French satirical magazine “Charlie Hebdo” published a special issue in which it named the prophet Muhammad (also spelled Mohammad) as its editor-in-chief. Late night, the magazine’s offices in Paris were destroyed by a Molotov cocktail attack. The entire French ...

McAfee Labs

Android Malware Spreads Through QR Code

Last week, there was quite a buzz in the mobile-malware researchers community about a new Android malware. It came to light not because of its sophistication or complexity but due to the simple method that it uses to spread. Most Android malware we have witnessed are repackaged malicious apps made ...

McAfee Labs

Satanbot Employs VBScript to Create Botnet

Malware is on the rise. At the beginning of 2008, our malware collection had 10 million samples. Today we have already surpassed 70 million. Most of the malicious samples are Trojans (backdoors, downloaders, fake alerts), but there are also a lot of viruses, worms, and bots that in a short ...

McAfee Labs

The Day of the Golden Jackal – The Next Tale in the Stuxnet Files: Duqu Updated

Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the near future. One thing for sure is that the Stuxnet team is still active–as recent evidence has revealed. McAfee Labs received a kit from an independent team of researchers that ...

Enterprise

Security Metrics and the Balanced Scorecard

If you can’t measure it, you can’t manage it.  Metrics, the bane and blessing of corporate citizens, emerge from this truism.  Metrics allow managers to determine the efficacy of process changes and technology implementation.  However, poor metrics sometimes impose an atmosphere of micromanagement that damages employee and customer relationships. The ...

Enterprise

Smartphone Security Best Practices

Smartphones have done wonderful things for employee mobility, but they have also complicated the security picture at organizations large and small. Where most companies used to limit smartphone use to one platform, such as Research In Motion’s Blackberry, most now cope with multiple smartphone models, platforms, and operating systems, each ...

Subscribe to McAfee Securing Tomorrow Blogs