Consumer Family Safety

Don’t Let the Grinch Hack Your Christmas!

What’s on your family’s Christmas list this year? Let me guess – technology! Our desire for shiny, fast, connected devices is almost a biological condition this time of year. However, our single-minded desire to get these devices in our hands at all costs, often means we forget about the risks… ...

Consumer Family Safety

STEM – How and Why To Get Your Daughter Involved

In 1990, the buzz around STEM (science, technology, engineering and maths) just didn’t exist. When I was doing my HSC, my subjects were all humanities. Lots of English and history broken up with a bit of French. For me, it was a dream. No science and maths – subjects that ...

Consumer Threat Notices

Leading E-Commerce Platform Magento Cracked by Cybercriminals

There’s a modern joy we’re all too familiar with. We’ve all made an online purchase while reclining in pajamas, computer on our lap. Everyone knows the comfort of simply punching credit card numbers into a website for a new item. That’s what we do for Converse shoes, Audi accessories, and ...

Consumer Threat Notices

Another Day, Another PoS Hack. What Makes the Micros Incident Different?

Motivated by money, cybercriminals are always chasing where it goes. That greed has now led them to where transactions are most concentrated: point-of-sales systems. These types of attacks have been prominent in the news lately, with the cases of Wendy’s and Omni Hotels. But today, we have news of criminals ...

McAfee Labs

Blockchain Transactions Create Risks for Financial Services

This post was written by Raj Samani and Christiaan Beek of McAfee , and Shane D. Shook, PhD. Trust is the most valuable commodity in the digital age. Failure to trust the systems or organizations in which we place our digital assets leads us to look at alternate providers, or ...

Family Safety

How to Report an Online Scam

For many online consumers, money (or the power of it) hovers quietly and invisibly over an online shopping cart only to be set free with a single click. That reality extends to our kids who have become eager consumers in the age of Pay Pal, Amazon, confirmation numbers, and free ...

Identity Protection Mobile and IoT Security

Should You Use Near-Field Communications?

Have you ever wondered what kind of superpower you’d have? I’ve always wanted to send messages and ideas with my mind to others. My dream can sort of come true with near-field communications (NFC). You’ve might not have heard of NFC, but if you have a smartphone, there’s a good ...

Family Safety Identity Protection Mobile and IoT Security

Scrooge’s 12 Scams of the Holidays

They’re baaaack! Actually, they never left—Scrooge’s little trolls work hard all year, scheming and scamming to steal holiday presents—or at least valuable information—from good girls and  boys. From the North Pole to the South Pole, they target every one of us through phishing, SMiShing (text phishing), shipping and gift card ...

McAfee Labs

Bitcoin Headlines Attract Malware Developers

Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate. In the second quarter of 2013, we discuss this topic. The following timeline highlights recent events about this virtual currency. In our report we noted the growing interest in malware Bitcoin miners: malware that hijacks ...

McAfee Labs

Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code

Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware and tools development. AutoIt allows both easy interface creation for rapid development and full Windows API access for whatever is not directly supported. We have seen an increase in the ...

Subscribe to McAfee Securing Tomorrow Blogs