Featured Blogs
Online Shopping Festivals – Things to Do Before Clicking on Add to Cart
Online sales are a huge rage these days! E-commerce firms are competing with each other to offer consumers the best...
Online shopping scams – 7 ways to fight them
Be wary of online shopping scams – 7 ways to fight them While some of us may be quite skilled at finding miscellaneous gadgets and...
Online Shopping: The Dos and Don’ts
Internet shopping has become an integral part of our daily lives, providing convenience, variety, and easy price comparisons. However, with this convenience comes potential risks. This article explores the dos and don’ts of online shopping to help you navigate this virtual marketplace safely and effectively.
Open Backdoors and Voice Assistant Attacks: Key Takeaways from 2019’s Mobile Threat Report
These days, we seem to have a newfound reliance on all things ‘smart.’ We give these devices the keys to...
Open Sesame: Hotel Rooms at Risk of Serious Room Key Hack
No one is a big fan of intruders, let alone being disturbed while you’re on vacation. This is a potential...
Operation (노스 스타) North Star A Job Offer That’s Too Good to be True?
Executive Summary We are in the midst of an economic slump [1], with more candidates than there are jobs, something...
Operation Diànxùn: Cyberespionage Campaign Targeting Telecommunication Companies
In this report the McAfee Advanced Threat Research (ATR) Strategic Intelligence team details an espionage campaign, targeting telecommunication companies, dubbed...
Operation Dragonfly Analysis Suggests Links to Earlier Attacks
On September 6, Symantec published details of the Dragonfly campaign, which targeted dozens of energy companies throughout 2017. This attack...
Operation Dragonfly Imperils Industrial Protocol
Recent headlines (here and here) may have struck fear into those living near major energy installations due to references about...
Operation High Roller Raises Financial Fraud Stakes
Earlier today Guardian Analytics and McAfee released the joint report “Dissecting Operation High Roller,” which describes a new breed of...
Operation North Star: Behind The Scenes
Executive Summary It is rare to be provided an inside view on how major cyber espionage campaigns are conducted within...
Operation North Star: Summary Of Our Latest Analysis
McAfee’s Advanced Threat Research (ATR) today released research that uncovers previously undiscovered information on how Operation North Star evaluated its...
Organizations Leave Backdoors Open to Cheap Remote Desktop Protocol Attacks
While researching underground hacker marketplaces, the McAfee Advanced Threat Research team has discovered that access linked to security and building automation systems of a major international airport could be bought for only US$10.
Organized Cybercrime: The Big Business Behind Hacks and Attacks
There’s a person behind every cybercrime. That’s easy to lose sight of. After all, cybercrime can feel a little anonymous,...
Our Experiences Participating in Microsoft’s Azure Sphere Bounty Program
From June to August, part of the McAfee Advanced Threat Research (ATR) team participated in Microsoft’s Azure Sphere Research Challenge. Our research resulted...
Our Findings on the Role of Security in the World of Gaming
Playing video games has become a popular pastime for children of all ages (even for some adults too), as the...
OurMine Claims to Have Breached Sony’s PlayStation Network and Stolen Information
Most security companies advertise their services online, hoping to attract customers with an honest promise of their abilities. OurMine, on...
OurMine is at it Again! How They Broke in to MineCraft Accounts
Gamers are one of the largest communities on the internet. YouTube’s most subscribed channel caters to players, 100 million...
OurMine Takes to Twitter, Hacking Netflix and Marvel Accounts
Another day, another OurMine hack. At least that’s been the notion of the past year, many of us in the...
Over 10 Million Facebook Users Hacked in Ongoing Phishing Scam
In this digital age, communicating online and through our devices has become the norm. From sharing highlights of last night’s...
Overcoming Targeted Attacks: a New Approach
Successful targeted attacks bypass security controls and typically cause significant damage to an enterprise. Damages may include reputation, monetary, and...
Oversharing on Social Media Common Amongst 50+
Thanks to social media, societal norms have undergone a seismic shift in the past five years. What was once considered...
Oversharing – Don’t Blame It All On The Kids!
No matter which way you interpret the plethora of research, it is very clear – our teens are oversharing. The...
Oversharing: Are You Ignoring Your Child’s Privacy When You Post Online?
Take it down, please. The above is a typical text message parents send to kids when they discover their child...
Ovidiy Stealer Malware Helps Cybercriminals Snatch Passwords for a Small Fee
You can buy almost anything online these days – clothes, books, food, the list goes on. That list also includes...
PACE – People, Alignment, Culture, and Execution
McAfee was founded in 1987, and at 32 years old, we’re moving faster than ever before with more precision, agility,...
Parasitic Coin Mining Creates Wealth, Destroys Systems
The increasing popularity of cryptocurrencies has inspired some people to pursue coin mining, essentially making money online. (Mining is the...
