A Billion Users Affected by Latest Yahoo Breach
Yahoo Inc. just revealed its second major breach in a year. Its first disclosure, taking place in September, claimed that...
Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up
The 2002 horror film, The Ring, had an interesting play on its genre: socialize the scares — at least...
Why You’re Going to Have to Start Filtering Your Calendar Invitations
Sometime in November, Apple users began receiving unwanted calendar invitations on their devices. These invitations featured “amazing savings” and discounts...
The Holiday Season is Here, Spreading Hackable Gifts Wide and Near
It’s the most wonderful time of the year, but I’m feeling anxious — security anxious, that is. Every year, we...
How Valuable Is Your Health Care Data?
This blog was written by Bruce Snell. Health care is a hot topic in security right now. A quick search...
Unfolding the Mystery of Cerber Ransomware’s Random File Extension
This blog post was written by Sudhanshu Dubey. In an earlier blog, we discussed the evolution of the popular Cerber...
Ransomware Variant XTBL Another Example of Popular Malware
We have seen a huge increase in ransomware during the past couple of years. At McAfee Labs we have recently...
How I Live Safe: 3 Tips for Staying Secure Online
As a security professional, online safety is always on my mind. Especially when I’m using my personal devices, rather than...
How Do I Live Safe?
This blog was written by Bruce Snell. You may have seen #HowILiveSafe floating around on Twitter. We thought it would...
New Security Reality for Internet of Things
Recent distributed denial of service (DDoS) attacks are forcing a shift in how we think about the Internet of...