Securing Tomorrow. Today.

How McAfee Can Help You Scale Security to Employees Working from Home

We’re in a moment of rapid change for our IT environments. As companies shift from working in an office within their controlled network to working from home, many are finding that the architectures they have in place aren’t ready for the scalability and security challenges of a decentralized workforce.

Read Blog
Enterprise

Dear Cisco, Thank You for Recommending McAfee

Some of you may know this, but before coming to McAfee, I worked for Cisco Systems.  So believe me when I say that Cisco is no push-over.  Cisco is competitive and the people at Cisco work hard to win.  That’s why I was particularly interested in the news that Cisco ...

Consumer Threat Notices Family Safety

The Top 12 Scams Of Christmas To Watch Out For

McAfee Latest 2012 Holiday-Related Online Scams and Security Tips for Consumers The holidays are just around the corner and amid the hustle and bustle many of us will fire up our devices to go online, order gifts, plan travel and spread Offers cheer. But while we’re getting festive, the cybercriminals ...

Consumer Threat Notices

Hack the Vote: Pros and Cons of Electronic Voting

After 17 months and billions in campaign spending, it was up to the scores of American people who flooded churches, schools, homes and auditoriums to cast their ballots for the future of American leadership. But amidst the highs and lows of election night, there was an ongoing conversation on how ...

Family Safety Executive Perspectives

The Connected Home – Introducing Little Red Boxes…

This will be old news to those of you who took the time to visit McAfee Focus 2012 , but for the rest – my team took the opportunity to introduce the concept of the McAfee “Little Red Box” in the Innovation roadshow. It’s a prototype project that my team has ...

McAfee Labs Executive Perspectives McAfee Partners

Tool Talk: Cracking the Code on XtremeRAT

Late last week, reports began to surface that the Israeli police (along with other regional law enforcement) were targeted by a malware attack.  The entry vector was described as a phishing campaign sent from Benny Gantz (head of the Israeli Defense Forces).  Initially, details and indicators around the malware were beyond sparse. ...

Identity Protection Mobile and IoT Security

Actress Sofia Vergara’s Personal Photos Hacked or Stolen Via Mobile

In my line of work I get emails such as this one: “Hi Robert, I’m not sure if you saw what had happened on my Facebook page last night, but someone stole my cell phone while I was at a concert, and posted all of my naked pictures off of ...

Family Safety Identity Protection

What Makes My Passwords Vulnerable?

There is no such thing as a truly secure pass­word. There are only more secure or less secure passwords. Passwords are currently the most convenient and effective way to control access to your accounts. Most people aren’t aware of the numerous com­mon techniques for cracking passwords: Dictionary attacks: There are ...

McAfee Labs

A Quick Analysis of the Flash Player Opcode-Verifying Code Execution Vulnerability

On October 12, McAfee Labs learned of proof-of-concept code exploiting a newly patched Flash Player vulnerability. Adobe had patched this vulnerability in its latest security update on October 8. Our research team rapidly responded to this threat with an in-depth analysis of the root cause and the degree of exploitability. ...

McAfee Labs

Update: NGRBot Posing as Skype Drops Ransomware With Fake McAfee Logo

This blog was updated on October 15. See the end of this file. We recently received a sample of the malware NGRBot from a customer, who got a spam email with what appears to be a Skype link. Victims are lured into clicking a link that promises an image. Once ...

McAfee Labs

Multiplatform Fake AV Uses Different GUIs

Since the beginning of October we have seen a variant of fake antivirus malware that belongs to the FakeRean family of rogue security products. FakeRean is distributed by drive-by downloads or is dropped and executed by another malware. It blocks victims from accessing any other legitimate application on an infected ...

Subscribe to McAfee Securing Tomorrow Blogs