McAfee Labs

When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign

Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets. The following flowchart shows a generic credential-stealing campaign in action. In the last step, the flow is bidirectional. The malware makes a two-way authentication-free connection between the victim and the attacker. This ...

Identity Protection

What is the Cloud?

You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe to put your data there? The cloud is best described as a network of servers offering different functions. Some servers allow you to store and access data, while others provide ...

Enterprise McAfee Labs

Understanding the Scope of Venom (CVE-2015-3456)

In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), ...

Enterprise

Enhanced Certificate Security – Pinning

Written by Deepak Choudhary There are always risks involved when relying on a third party to send and receive sensitive data over secure network channels. While we recognize the roles of the Public Key Infrastructure (PKI) and third party certificate authority (CA), we also believe that Certificate SSL Pinning can ...

Enterprise

‘Golden Hour’ Incident Response Agility

Security leaders must encourage and integrate data, processes, and controls to facilitate comprehension and investment of precious human capital in higher-level tasks. Do you really need to worry about targeted attacks? In our new Tackling Incident Detection and Response survey, we found that, depending on the size of your business, ...

Enterprise

Security in the Software Defined Data Center

Today, almost every component of a data center operates as a generalized pool of hardware resources. Whether it is computing power, storage, or networking, you can provision, operate, and manage your resources in the most efficient way for your requirements. Workloads in these Software Defined Data Centers (SDDC) spread across ...

Executive Perspectives

Predictive Analytics: The Future Is Now

Enhanced analytical capabilities will help organizations better understand how attacks will unfold, and how to stop them in their earliest stages.  Prediction is as old as humankind, as we’ve search for clues to the future. Big data, computer models, and sophisticated algorithms have brought us much closer to accurately predicting ...

Data Security

Hidden Low Hanging Avaya IP Office Default Credentials

Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used ...

Consumer

Are We Really Expressing Ourselves on Social Media, Or Are We Too Scared?

When social media really took off about 10 years ago, I think many of us assumed that it might just provide the perfect platform for true freedom of expression. But has this really happened? Are we sharing our convictions and opinions on our Twitter feeds and Facebook pages? Apparently not. ...

Enterprise McAfee Partners

McAfee IPS and the Gartner Magic Quadrant

For the eighth consecutive year, Gartner is telling your customers that McAfee is a leader in the Network Intrusion Prevention System (IPS) market. Do you know why? It’s a compelling story that centers on the McAfee Network Security Platform, an IPS solution that discovers and blocks sophisticated threats in the ...

Subscribe to McAfee Securing Tomorrow Blogs