Securing Tomorrow. Today.

The Fastest Route to SASE

Do you want to take the fastest route to SASE? Discover why fast & secure cloud transformation requires an intelligent, hyperscale platform to accelerate SASE adoption.

Read Blog
McAfee Labs

Android Malware Pairs Man-in-the-Middle With Remote-Controlled Banking Trojan

Based on the Android malware that we’ve seen so far, one of the principal motivations to develop and spread malware on Android is to gain financial profit. We often see deceptive applications that send SMS messages to premium-rate numbers without the user’s consent or that run man-in-the-middle attacks to forward ...

Enterprise Security Operations

An Update on DNSChanger and Rogue DNS Servers

In late 2011, the FBI released documents and data focusing on “Operation Ghost Click.” This malicious operation, leveraging a variety of DNSChanger-type malware, was defined by the FBI as an “international cyber ring that infected millions of computers.” Associated malware samples and events can be traced back several years, and multiple platforms were targeted. ...

Enterprise

PayPal Phishing Scams & E-Payment Security

I’m a huge fan of PayPal and use it on a regular basis – it’s linked to my bank account and credit cards, and it has a lot of my close friends and family’s shipping addresses for easy gift giving.  So it’s no wonder that I get a lot of ...

Family Safety Identity Protection Mobile and IoT Security

Don’t Let Location-Based Services Put You in Danger

Location-based services utilize geo-location information to publish your whereabouts. In some cases, these services can also provide discounts or freebies as a reward for “checking in” at participating businesses and gathering “points.” These services can also be used to share photos and other media in real-time with your friends and ...

McAfee Labs

Google Code Projects Host Android Malware

[March 1: See update at end] Google Code is a well-known platform that provides a collaborative environment for developers working on open source projects. It’s also a target for malware developers. Contrary to what you may think, this is not the first time that Google Code has been used to ...

Cloud Security

Database Security: Establishing A Critical Last Line of Defense

According to a 2010 Verizon Business study, more than 90% of records breached involved a database, with over 87% based on exploits requiring significant technical skills. We need to take studies like this as an important lesson about security management. In our profession, it is always necessary to have the ...

Family Safety

Dos And Don’ts Of Online Shopping

Let me begin with a confession. I am addicted to shopping. Nothing lifts off those blues faster than a purchasing spree across several of my favourite stores. And not only for myself or my family- I am happy to accompany others too on their shopping spree; like for my cousin’s ...

Family Safety Identity Protection Mobile and IoT Security

Protect Yourself from “SMiShing”

“SMiShing” is a silly word—even sillier than “phishing,” but equally dangerous. Phishing occurs when scammers send emails that appear to have been sent by legitimate, trusted organizations in order to lure recipients into clicking links and entering login data and other credentials. The term is a reference to the scammers’ ...

McAfee Labs

Android DIY DoS App Boosts Hacktivism in South America

Hacktivism has become very popular in recent years; one of its leading agents is the online community Anonymous. Hacktivist groups use digital tools to perform denial of service (DoS) attacks for pursue political ends or to protest against controversial laws in countries around the world. One of the most common ...

Family Safety Mobile and IoT Security

Almost 5% of Smartphones Lost Every Year

McAfee and Ponemon Institute recently released “The Lost Smartphone Problem,” a study that attempts to determine how many employees’ smartphones are lost or stolen, and the consequences of these lost cell phones on various organizations. Among the 439 sample organizations, the number of missing smartphones is significant: 142,708 in one ...

Subscribe to McAfee Securing Tomorrow Blogs