Data Security

The Past, Present, and Future of Phishing and Malware

This blog was written by David Bull, McAfee’s former Director, Enterprise Solution Marketing. In the Digital Age, email is second nature. It’s a commonly accepted method of communication, and a convenient one, at that. With convenience, however, comes danger – especially if you’re not even alerted to the bait! This ...

Executive Perspectives

Application Layer Exfiltration Protection: A New Perspective on Firewalls

Organizations must adopt a new way of thinking about safeguarding sensitive data from theft and unauthorized exfiltration. The recent slew of high profile data breaches has prompted organizations to harden network perimeter defenses with the latest security technologies. In response, some cybercriminals are shifting their focus toward the human element, ...

Consumer Threat Reports

Google Brings Safe Browsing to the Masses With Its Safe Browsing API

The best way to protect yourself from the malicious programs (often called malware) hidden across the Internet, is to have the latest and greatest tools at your disposal. That includes your Web browser, the very software application you’re using right now to read this blog. Now not all web browsers ...

Identity Protection

What is a Remote Administration Tool (RAT)?

Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I smell a rat. Literally, a RAT. A RAT or remote administration tool, is software that gives a person full control a tech device, remotely. The RAT gives the user access ...

Consumer Threat Reports

Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own

Director Michael Mann’s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity to date. So, of course, I just had to get down to my local theater and see it for myself. For those of you unfamiliar with the terminology, blackhat is ...

Subscribe to McAfee Securing Tomorrow Blogs