Consumer Threat Notices

OurMine is at it Again! How They Broke in to MineCraft Accounts

  Gamers are one of the largest communities on the internet. YouTube’s most subscribed channel caters to players, 100 million of them watch gameplay streaming on Twitch.tv every month, and Pokémon Go has just conquered the world. But this robust online presence has also sparked interest from another group: cybercriminals. ...

Consumer Threat Notices

Going The Extra Mile: Pandora, Facebook, and Netflix Ask Users to Reset Passwords

It’s a good sign when businesses take the initiative to protect consumers’ online safety. Not only does it allow customers to feel secure using their services, but it also facilitates positive change. When one business takes an extra step to protect users, industry security standards are advanced. The envelope is ...

Consumer Threat Notices

What We Can Take Away from the Milwaukee Bucks Data Breach

Large sports leagues are no strangers to the spotlight, and basketball is no different. The latest scandal? Last week, a major security incident put the NBA on center stage. The Milwaukee Bucks basketball team had their financial information stolen by cybercriminals, thanks to a very convincing email scam. Here’s what ...

Executive Perspectives

Study Reveals the Most Common Attack Methods of Data Thieves

This blog post was written by Raja Patel. Learning more about your attackers helps to improve your security profile and reduce the possibility of a breach. Sophisticated criminals using advanced techniques are behind most of the recent security breaches, targeting small network openings and user weaknesses left vulnerable by even ...

Enterprise

Verizon DBIR: Noise & Attack Patterns Mapped to 20 Critical Controls

This blog was written by Barbara Kay. In our Security Connected discussions, security leaders routinely ask “Where do I invest for results? How do I communicate the risk reduction impact of security investments to the Board?” Now there’s practical assistance on which controls count and why: guidance based on attack ...

Enterprise

How to Protect Your Cash Register from Cyber Criminals

By now, everyone in has heard about the Target and Neiman Marcus data breaches. We’ve recently discovered these retail attacks have been targeting Windows-based cash register systems aka point-of-sales (POS) systems. Hackers are finding ways to penetrate retailers’ networks and install malware on their Windows-based cash register systems and Back-of-the-House ...

Subscribe to McAfee Securing Tomorrow Blogs