IoT Devices: The Gift that Keeps on Giving… to Hackers
McAfee Advanced Threat Research on Most Hackable Gifts You’ve probably noticed the recent increase in Internet connected drones, digital assistants,...
The Hack Back: A Double-Edged Sword
Global cyberattacks like Mirai, WannaCry and Petya have left victims feeling helpless and eager to gain back the data they’ve...
The importance of cyber self-defense education
This blog post was written by Nick Viney. As recent headlines have highlighted, one thing is clear; there is still...
Is that Broom Removing the Dirt? Sanitizing CCleaner with McAfee Advanced Threat Defense
This blog was written by Stan Golubchik. On Monday, security researchers in Cisco’s Talos division revealed that the ever popular,...
Four of the coolest jobs in cybersecurity
This blog post was written by Nick Viney. With the rapid growth of the Internet of Things (IoT) and data...
How a Hacking Group Used Britney Spears’ Instagram to Operate a Command and Control Server
A nasty piece of malware is currently being tested by a Russian hacking group named Turla, and its trial round...
Change, embrace it – Why you need to change the way you look at security
Change. “There is a time appointed for everything and a time for every purpose—” Imagine trying to change a cowboy...
Weaponized Medical Data as Damaging as Clinton’s Emails or Trump’s Videos
The 2016 presidential election in the United States will be remembered for a great many things. Never before in US...
Send Your Kids Back to School with Mobile Safety in Mind
The days are getting shorter and your bags are (finally) unpacked from the annual family vacation. Summer is officially coming...
Go Dork Yourself! Because hackers are already dorking you
Google Dorking is a search technique that enables hackers to gain access to information that corporations and individuals did not...