Securing Tomorrow. Today.

McAfee COVID-19 Report Reveals Pandemic Threat Evolution

In this “Special Edition” threat report, we dive deep into the COVID-19 related attacks observed by our McAfee Advanced Threats Research and McAfee Labs teams in the first quarter of 2020 and the early months of the pandemic.

Read Blog
Mobile and IoT Security

Protect Yourself from Vishing

“Vishing” occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft. Vishing can occur both on your landline phone or via your ...

Enterprise

Social Media Security Best Practices

Facebook, Twitter, LinkedIn and other social media platforms are invaluable tools for 21st century enterprise collaboration and marketing, but they introduce multiple security hazards that organizations struggle to address. Dangers include confidential data leakage, reputational damage, social engineering opportunities for hackers, malware, and lawsuits stemming from inappropriate use by employees ...

McAfee Labs Executive Perspectives

RDP+RCE=Bad News (MS12-020)

See March 15 and 16 updates at the end of this blog. —————————————————-   The March Security Bulletin release from Microsoft was relatively light in volume. Out of the six bulletins released, only one was rated as Critical. And for good reason. MS12-020 includes CVE-2012-0002. This flaw is specific to the Remote ...

McAfee Labs

Android Malware Pairs Man-in-the-Middle With Remote-Controlled Banking Trojan

Based on the Android malware that we’ve seen so far, one of the principal motivations to develop and spread malware on Android is to gain financial profit. We often see deceptive applications that send SMS messages to premium-rate numbers without the user’s consent or that run man-in-the-middle attacks to forward ...

Enterprise Security Operations

An Update on DNSChanger and Rogue DNS Servers

In late 2011, the FBI released documents and data focusing on “Operation Ghost Click.” This malicious operation, leveraging a variety of DNSChanger-type malware, was defined by the FBI as an “international cyber ring that infected millions of computers.” Associated malware samples and events can be traced back several years, and multiple platforms were targeted. ...

Enterprise

PayPal Phishing Scams & E-Payment Security

I’m a huge fan of PayPal and use it on a regular basis – it’s linked to my bank account and credit cards, and it has a lot of my close friends and family’s shipping addresses for easy gift giving.  So it’s no wonder that I get a lot of ...

Family Safety Identity Protection Mobile and IoT Security

Don’t Let Location-Based Services Put You in Danger

Location-based services utilize geo-location information to publish your whereabouts. In some cases, these services can also provide discounts or freebies as a reward for “checking in” at participating businesses and gathering “points.” These services can also be used to share photos and other media in real-time with your friends and ...

McAfee Labs

Google Code Projects Host Android Malware

[March 1: See update at end] Google Code is a well-known platform that provides a collaborative environment for developers working on open source projects. It’s also a target for malware developers. Contrary to what you may think, this is not the first time that Google Code has been used to ...

Cloud Security

Database Security: Establishing A Critical Last Line of Defense

According to a 2010 Verizon Business study, more than 90% of records breached involved a database, with over 87% based on exploits requiring significant technical skills. We need to take studies like this as an important lesson about security management. In our profession, it is always necessary to have the ...

Family Safety

Dos And Don’ts Of Online Shopping

Let me begin with a confession. I am addicted to shopping. Nothing lifts off those blues faster than a purchasing spree across several of my favourite stores. And not only for myself or my family- I am happy to accompany others too on their shopping spree; like for my cousin’s ...

Subscribe to McAfee Securing Tomorrow Blogs