This article has been indexed from McAfee Blogs The McAfee Advanced Threat Research team today published the McAfee Labs Threats Report: June 2021. In this edition we introduce additional context into the biggest stories dominating the year thus far including…
Category: McAfee Blogs
Restricting Supplier Choice Isn’t an Option to Enhance Digital Sovereignty
This article has been indexed from McAfee Blogs Digital sovereignty and strategic autonomy are phrases that are used almost daily in EU policy circles, loosely framed around the EU’s ability to carve out its own future in the digital sphere,…
Watch Out for These 3 Online Job Scams
This article has been indexed from McAfee Blogs If you recently found yourself looking for a new job, you are far from alone. According to the Institute of Labor Economics, more Canadians were seeking new employment opportunities at the height of the pandemic than during the…
Do the Benefits of Bitcoin Outweigh the Risks?
This article has been indexed from McAfee Blogs What do Burger King and the popular “Doge” meme have in common? They both have cryptocurrencies named after their likeliness. WhopperCoin and Dogecoin are just two examples of the thousands of types of cryptocurrencies…
Transforming to a Predictive Cyber Defense
This article has been indexed from McAfee Blogs How much of the global economy is managed from a home network these days? Or, more importantly, what percentage of your company’s most sensitive data passes through employee home networks right now?…
7 Tips to Protect Your Smartphone from Getting Hacked
This article has been indexed from McAfee Blogs There’s little rest for your hard-working smartphone. If you’re like many professionals today, you use it for work, play, and a mix of personal business in between. Now, what if something went wrong with that phone, like…
Is Your Peloton Spinning Up Malware?
This article has been indexed from McAfee Blogs [Disclaimer: The McAfee ATR team disclosed this vulnerability to Peloton and promptly started working together to responsibly develop and issue a patch within the disclosure window. The patch was tested and confirmed effective on June…
A New Program for Your Peloton – Whether You Like It or Not
This article has been indexed from McAfee Blogs Executive Summary The McAfee Advanced Threat Research team (ATR) is committed to uncovering security issues in both software and hardware to help developers provide safer products for businesses and consumers. As security researchers, something that we always…
McAfee Named a 2021 Gartner Peer Insights Customers’ Choice for SWG
This article has been indexed from McAfee Blogs The McAfee team is very proud to announce that, for the third year in a row, McAfee was named a 2021 Gartner Peer Insights Customers’ Choice for Secure Web Gateways for its…
How to Prepare for Your Child’s First Smartphone
This article has been indexed from McAfee Blogs If only more things in life came with training wheels; a child’s first smartphone could certainly use some. Like taking off the training wheels and riding out into the neighborhood for the first time, a smartphone opens an entirely new…
McAfee a Leader in The Forrester Wave™ Unstructured Data Security Platforms
This article has been indexed from McAfee Blogs The mass migration of employees working from home in the last 14 months has accelerated the digital transformation of businesses. Cloud applications are no longer a “nice to have,” they are now…
Finding Success at Each Stage of Your Threat Intelligence Journey
This article has been indexed from McAfee Blogs Every week it seems there’s another enormous breach in the media spotlight. The attackers may be state-sponsored groups with extensive resources launching novel forms of ransomware. Where does your organization stand on…
The Executive Order – Improving the Nation’s Cyber Security
This article has been indexed from McAfee Blogs On May 12, the President signed the executive order (EO) on Improving the Nation’s Cybersecurity. As with every executive order, it establishes timelines for compliance and specific requirements of executive branch agencies…
Are Virtual Machines the New Gold for Cyber Criminals?
This article has been indexed from McAfee Blogs Introduction Virtualization technology has been an IT cornerstone for organization for years now. It revolutionized the way organizations can scale up IT systems in a heartbeat, allowing then to be more agile…
How to Teach Kids About Online Safety: A Guide
This article has been indexed from McAfee Blogs Kids are online now more than ever, not just during free time, but also during school time. It is impossible to always peek over their shoulder, and depending on their age, they may grow tired of a POS (aka parent…
Avoid Making Costly Mistakes with Your Mobile Payment Apps
This article has been indexed from McAfee Blogs There used to be a time when one roommate split the cost of rent with another by writing a check. Who still owns a checkbook these days? Of course, those days are nearly long gone, in large part thanks to “peer to peer”…
Apple Users: This macOS Malware Could Be Spying on You
This article has been indexed from McAfee Blogs In 2018, Macs accounted for 10% of all active personal computers. Since then, popularity has skyrocketed. In the first quarter of 2021, Macs experienced 115% growth when compared to Q1 2020, putting Apple in fourth place in the global PC…
8 Tips for Staying Safe from Ransomware Attacks
This article has been indexed from McAfee Blogs What is Ransomware? Over the past year, you may have seen the term ransomware popping up frequently. For enterprising hackers, this once uncommon tactic has become standard operating procedure, and with good…
The What, Why, and How of AI and Threat Detection
This article has been indexed from McAfee Blogs There are more online users now than ever before, thanks to the availability of network-capable devices and online services. The internet population in Canada is the highest it has been, topping the charts at…
A Safer Internet for You, Your Family, and Others Too
This article has been indexed from McAfee Blogs With so many of us relying on the internet in ways we simply haven’t before, it follows that a safer internet is more important than ever before too. June marks Internet Safety Month, a time where we…
Potentially Malicious Apps Your Kids May Use
This article has been indexed from McAfee Blogs It’s a question I get several times a year from anxious parents, either via a direct message, an email or even in line at the grocery store. It goes something like this: “What’s the one thing you wish you’d done better when monitoring…
Happy Birthday GDPR!
This article has been indexed from McAfee Blogs Believe it or not, the baby turns 3 today! And like with every three-year-old, there is a lot to watch out for. Granted, when GDPR was born it was after a 2-year…
Why May 2021 Represents a New Chapter in the “Book of Cybersecurity Secrets”
This article has been indexed from McAfee Blogs May 2021 has been an extraordinary month in the cybersecurity world, with the DoD releasing its DoD Zero Trust Reference Architecture (DoDZTRA), the Colonial Pipeline being hit with a ransomware attack, and…
Cyber Cyber, Burning Bright: Can XDR Frame Thy Fearful Asymmetry?
This article has been indexed from McAfee Blogs The security industry is engulfed in the most asymmetric cyberwarfare we have ever seen. The outcome of an Attacker’s mission may depend entirely upon a single misplaced charge on a single memory…
Private browsing vs VPN – Which one is more private?
This article has been indexed from McAfee Blogs As people turn to the Internet for news and answers to tough questions, it only makes sense that it would come to know you better than your closest friends and family. When…
Alert Actionability In Plain English From a Practitioner
This article has been indexed from McAfee Blogs In response to the latest MITRE Engenuity ATT&CK® Evaluation 3, McAfee noted five capabilities that are must-haves for Sec Ops and displayed in the evaluation. This blog will speak to the alert actionability capability which is essential. This critical ability to react in the fastest possible way, as early as possible…
Through Your Mind’s Eye: How to Address Biases in Cybersecurity – Part 2
This article has been indexed from McAfee Blogs In Part 1 of our Through Your Mind’s Eye series, we explored how our brains don’t give each decision we make equal attention, and we take mental shortcuts known as biases. These…
Give CISOs a Shot – They Deserve It
This article has been indexed from McAfee Blogs Imagine this scenario: a CEO, CIO, CTO, CISO walk into a bar… The CTO has heard about cocktails that go beyond the “pour and shake,” and asks the bartender what they know about molecular gastronomy to take their…
At Home or On-the-Go: Boost Your Internet Safety this Summer
This article has been indexed from McAfee Blogs Summer is here, which means more sun and more fun for everyone. It also means more streaming, gaming, and downloading. This seasonal reality reminds us that to enjoy the best of summer, it’s important to stay aware of…
Keep the Change: 3 Tips for Using the Twitter Tip Jar
This article has been indexed from McAfee Blogs When we think of tipping, many don’t see it as anything beyond a display of gratitude. However, Twitter’s latest feature is prompting its users to rethink this sentiment. It hasn’t been long since Twitter released their new Tip Jar feature, which allows users on the platform to send tips…
Data Localisation – The Magic Bullet?
This article has been indexed from McAfee Blogs In the wake of the Schrems II decision[1], and even more in the light of Friday’s Facebook ruling[2], the question on everyone’s mind is how to truly protect personal data from the…
Through Your Mind’s Eye: What Biases Are Impacting Your Security Posture?
This article has been indexed from McAfee Blogs Cybersecurity and biases are not topics typically discussed together. However, we all have biases that shape who we are and, as a result, impact our decisions in and out of security. Adversaries…
Miles Wide & Feet Deep Visibility of Carbanak+FIN7
This article has been indexed from McAfee Blogs In our last blog about defense capabilities, we outlined the five efficacy objectives of Security Operations, that are most important for a Sec Ops; this blog will focus on Visibility. The MITRE…
Less Is More: Why One Antivirus Software Is All You Need
This article has been indexed from McAfee Blogs Personal devices and the information they carry are incredibly valuable to their owners. It is only natural to want to protect your device like a royal family fortifying a medieval castle. Unlike medieval castles…
Elevate Your Financial Security: How to Safely Bank Online
This article has been indexed from McAfee Blogs Today’s technology allows you to complete various tasks at the touch of a button wherever you go. As a result, you place trust in online services that make everyday chores more convenient without second-guessing their effects. One such service is online banking. More Canadians are doing their banking virtually with over…
Mission Possible: Hunting Down and Stopping Stealthy Attackers with MVISION XDR
This article has been indexed from McAfee Blogs Imagine, if you will, a scene straight out of one of your favorite impossible mission movies. The background music is driving a suspenseful beat while the antagonist attempts to steal the latest…
POPIA – July 1st Deadline Approaches For New South African Data Protection Act
This article has been indexed from McAfee Blogs Data protection acts are regularly coming into force around the world and on July 1st 2021 it is the turn of South Africa, as the POPIA (Protection of Personal Information Act) will…
Scammers Impersonating Windows Defender to Push Malicious Windows Apps
This article has been indexed from McAfee Blogs Summary points: Scammers are increasingly using Windows Push Notifications to impersonate legitimate alerts Recent campaigns pose as a Windows Defender Update Victims end up allowing the installation of a malicious Windows Application…
CRN’s Women of the Channel 2021 Recognizes McAfee Leaders
This article has been indexed from McAfee Blogs Every year CRN recognizes the women who are leading the channel and their unique strengths, vision, and achievements. This year, CRN recognized five McAfee individuals on their prestigious list of those leading the channel. Those selected…
Don’t Sweat Your Security: How to Safely Incorporate IoT Into Your Fitness Routine
This article has been indexed from McAfee Blogs Many have seamlessly transitioned their fitness regimens out of the gym and into the living room since the start of the COVID-19 pandemic, thanks in part to the use of IoT devices. IoT (Internet of Things) denotes the web of interconnected…
DarkSide Ransomware Victims Sold Short
This article has been indexed from McAfee Blogs Over the past week we have seen a considerable body of work focusing on DarkSide, the ransomware responsible for the recent gas pipeline shutdown. Many of the excellent technical write-ups will detail…
3 Tips to a Holistic Online Security Approach
This article has been indexed from McAfee Blogs Cybersecurity is often used as a blanket term to address online safety. Cybersecurity can refer to the software used to protect your devices, but it can also refer to the processes you put in place to…
What the MITRE Engenuity ATT&CK® Evaluations Means to SOC Teams
This article has been indexed from McAfee Blogs SOCwise Weighs In When the infamous Carbanak cyberattack rattled an East European bank three years ago this month few would have guessed it would later play a starring role in the MITRE…
Major HTTP Vulnerability in Windows Could Lead to Wormable Exploit
This article has been indexed from McAfee Blogs Today, Microsoft released a highly critical vulnerability (CVE-2021-31166) in its web server http.sys. This product is a Windows-only HTTP server which can be run standalone or in conjunction with IIS (Internet Information…
5 Ways to Protect Your Online Privacy
This article has been indexed from McAfee Blogs When you open your laptop or your mobile device, what is the first thing you do? Do you head to your favorite social media site to skim the latest news, or do you place your weekly grocery…
Cloud Native Security Approach Comparisons
Vinay Khanna, Ashwin Prabhu & Sriranga Seetharamaiah also contributed to this article. In the Cloud, security responsibilities are shared between the Cloud Service Provider (CSP) and Enterprise Security teams. To enable Security teams to provide compliance, visibility, and control across the…
Seeking Reconnection: Internet Usage and the Return to Travel
Even as the internet kept us connected with family and friends during the pandemic, people remain understandably eager to reconnect in person as vaccines roll out and restrictions ease. In fact, people are making travel plans accordingly. Nearly two-thirds (64%) of people worldwide said that they’re planning to travel for leisure…
“Fool’s Gold”: Questionable Vaccines, Bogus Results, and Forged Cards
Preface Countries all over the world are racing to achieve so-called herd immunity against COVID-19 by vaccinating their populations. From the initial lockdown to the cancellation of events and the prohibition of business travel, to the reopening of restaurants, and…
Gartner names McAfee a Leader in 2021 Magic Quadrant for Endpoint Protection Platforms
At McAfee, we believe no one person, product or organization can combat cybercrime alone. That is why we continue to build our device-to-cloud security platform on the premise of working together – together with customers, partners and even other cybersecurity vendors. We…
More Apps for Younger Users Emerging. Here’s What Parents Need to Know.
More and more social platforms are coming up with safer ways for younger kids to access their apps. The most recent announcement comes from Facebook who is reportedly creating a version of Instagram for kids 13 and under. It’s a family safety…
How to Remain Secure While Using Running Apps
When gyms were forced to close last year, you likely looked for other ways to get some exercise and stay active during quarantine. From investing in a few pairs of dumbbells or perhaps downloading an app or two to help you track your workouts, you found…
RSA Conference 2021: The Best Place to Strengthen Your Resilience
This year’s RSA Conference will look a little different. Instead of booking flights and hotel rooms in the busy city of San Francisco, we’ll be powering up computers in our home office with family in the next room. We’ve all…
Defending Cybersecurity Can’t Be Done Blindfolded–The EU’s NIS2 Review Can Set This Right
Cybercriminals are currently enjoying a golden age, with the volume and severity of attacks growing constantly, and an ability to commit hostile acts with impunity. The EU, in its overhaul of cybersecurity laws dubbed NIS2, is committed to ensuring that…
Beware of Social Media Scams
Social media is a great place to connect with friends and family. Unfortunately, it is also a great place for misinformation to run rampant, and it is a virtual treasure chest for cybercriminals to steal personal information. Over 25 million…
McAfee Proactive Security Proves Effective in Recent MITRE ATT&CK™
McAfee Soars with Superior Protection Results Bottom Line: McAfee stopped the MITRE ATT&CK Evaluation Carbanak and FIN7 threats in their tracks within the first 15% of the major steps of the attack chain (on average), delivering on a critical security operations center (SOC) strategy: Stop the attack…
World Password Day: Make Passwords the Strongest Link in Your Online Security
World Password Day isn’t the most popular day on the calendar, but it’s an important reminder that good password hygiene is essential to staying safe online. This World Password Day, we’d like to talk about improving your password hygiene, how…
How to Stop the Popups
McAfee is tracking an increase in the use of deceptive popups that mislead some users into taking action, while annoying many others. A significant portion is attributed to browser-based push notifications, and while there are a couple of simple steps…
Fraudulent Apps that Automatically Charge you Money Spotted in Google Play
Read the original article: Fraudulent Apps that Automatically Charge you Money Spotted in Google Play
Stupid Is as Stupid Does: XDR Is About the Journey, Not the Destination
Read the original article: Stupid Is as Stupid Does: XDR Is About the Journey, Not the Destination
5 Ways to Reset Your Family’s Digital Habits this Summer
Read the original article: 5 Ways to Reset Your Family’s Digital Habits this Summer
McAfee Recognised in 2021 Gartner Solution Scorecard Report
Read the original article: McAfee Recognised in 2021 Gartner Solution Scorecard Report Indus […]Content was cut in order to protect the source.Please visit the source for the rest of the article. Read the original article: McAfee Recognised in 2021 Gartner…
PC Gamers (and Parents of Gamers) Rejoice!
Read the original article: PC Gamers (and Parents of Gamers) Rejoice!
The Mothers of Invention: Women Who Blazed the Trail in Technology
Read the original article: The Mothers of Invention: Women Who Blazed the Trail in Technology
Ransomware Task Force Releases its Comprehensive Framework for Action
Read the original article: Ransomware Task Force Releases its Comprehensive Framework for Action
New Security Approach to Cloud-Native Applications
Read the original article: New Security Approach to Cloud-Native Applications With on-premises i […]Content was cut in order to protect the source.Please visit the source for the rest of the article. Read the original article: New Security Approach to Cloud-Native…
Digital Estate Planning – What to Do With Your Digital Assets
Read the original article: Digital Estate Planning – What to Do With Your Digital Assets
You Don’t Have to Give Up Your Crown Jewels in Hopes of Better Cloud Security
Read the original article: You Don’t Have to Give Up Your Crown Jewels in Hopes of Better Cloud Security
Trust Nobody, Not Even Yourself: Time to Take Zero Trust Seriously
Read the original article: Trust Nobody, Not Even Yourself: Time to Take Zero Trust Seriously In the working world, there’s a chance you’ve come across your fair share of team-building exercises and workshops. There’s one exercise that comes to mind that…
Beware of BRATA: How to Avoid Android Malware Attack
Read the original article: Beware of BRATA: How to Avoid Android Malware Attack
Lessons We Can Learn From Airport Security
Read the original article: Lessons We Can Learn From Airport Security Most of us don’t have responsibility for airports, but thinking about airport security can teach us lessons about how we consider, design and execute IT security in our enterprise.…
Digital Divorce: Who Gets the Airline Miles and Music Files?
Read the original article: Digital Divorce: Who Gets the Airline Miles and Music Files?
McAfee Provides Max Cyber Defense Capabilities in MITRE’s Carbanak+FIN7 ATT&CK® Evaluation
Read the original article: McAfee Provides Max Cyber Defense Capabilities in MITRE’s Carbanak+FIN7 ATT&CK® Evaluation
SOCwise Series: A Tale of Two SOCs with Chris Crowley
Read the original article: SOCwise Series: A Tale of Two SOCs with Chris Crowley
McAfee VP Shares His Four Pledges for a Healthier Lifestyle
Read the original article: McAfee VP Shares His Four Pledges for a Healthier Lifestyle
Clever Billing Fraud Applications on Google Play: Etinu
Read the original article: Clever Billing Fraud Applications on Google Play: Etinu
McAfee Awarded “Cybersecurity Excellent Awards”
Read the original article: McAfee Awarded “Cybersecurity Excellent Awards”
Digital Spring Cleaning: Seven Steps for Faster, Safer Devices
Read the original article: Digital Spring Cleaning: Seven Steps for Faster, Safer Devices
Why Coin Miners Go Bad & How to Protect Your Tech When They Do
Read the original article: Why Coin Miners Go Bad & How to Protect Your Tech When They Do
Let’s Make Security Easy
Read the original article: Let’s Make Security Easy
McAfee Labs Report Reveals Latest COVID-19 Threats and Malware Surges
Read the original article: McAfee Labs Report Reveals Latest COVID-19 Threats and Malware Surges
BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain
Read the original article: BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain
AI Is Alive! But Not Without Our Help
Read the original article: AI Is Alive! But Not Without Our Help
McAfee Defender’s Blog: Cuba Ransomware Campaign
Read the original article: McAfee Defender’s Blog: Cuba Ransomware Campaign Cuba Ransomware Overview Over the past year, we have seen ransomware attackers change the way they have responded to organizations that have either chosen to not pay the ransom or…
McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware
Read the original article: McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware Executive Summary Cuba ransomware is an older ransomware, that has recently undergone some development. The actors have incorporated the leaking of victim data to increase its impact and revenue, much like we have…
More Money, Less Problems: XDR Investment Can Protect the Financial Services Industry
Read the original article: More Money, Less Problems: XDR Investment Can Protect the Financial Services Industry The connection between cybersecurity and poet Ralph Waldo Emerson is not directly evident, however he once said, “money often costs too much.” This statement…
Prioritizing Security in a Remote Learning Environment
Read the original article: Prioritizing Security in a Remote Learning Environment Prioritizing Security in a Remote Learning Environment Learning environments are not what they used to be, and as educational institutions deploy new technology to facilitate a safe and effective…
Is the Clubhouse App a Safe Place for Kids to Hangout?
Read the original article: Is the Clubhouse App a Safe Place for Kids to Hangout? Is the Clubhouse App a Safe Place for Kids to Hangout? Most of us have fond summer memories of hanging out with friends in a…
Myth-busting Antivirus Software Assumptions
Read the original article: Myth-busting Antivirus Software Assumptions Myth-busting Antivirus Assumptions The number of new viruses grows every day. In fact, McAfee recently registered a 605% increase in total Q2 COVID-19 themed threat detections, contributing to the millions already in existence. While there is…
Check up on Your Virtual Safety: Tips for Telehealth Protection
Read the original article: Check up on Your Virtual Safety: Tips for Telehealth Protection Check up on Your Virtual Safety: Tips for Telehealth Protection In a poll conducted by the Canadian Medical Association, nearly half of Canadians have used telehealth…
Protect Your Digital Wellness: Don’t Post Your Vaccination Card Online
Read the original article: Protect Your Digital Wellness: Don’t Post Your Vaccination Card Online Protect Your Digital Wellness: Don’t Post Your Vaccination Card Online Think Twice Before Posting Your Vaccination Card on Social Media After much anticipation, you finally get…
5 Ways MVISION XDR Innovates with MITRE ATT&CK
Read the original article: 5 Ways MVISION XDR Innovates with MITRE ATT&CK The MITRE ATT&CK® Framework proves that authority requires constant learning and the actionable information it contains has never held greater currency. Likewise, XDR, the category of extended detection and response…
How to Stay Connected and Protected in a Remote Work Environment
Read the original article: How to Stay Connected and Protected in a Remote Work Environment How to Stay Connected and Protected in a Remote Work Environment Advancements in cloud solutions and collaboration tools in recent years, coupled with the necessity…
Tax Season is Here: Avoid These Common Scams Targeting Canadians
Read the original article: Tax Season is Here: Avoid These Common Scams Targeting Canadians Tax Season is Here: Avoid These Common Scams Targeting Canadians Tax return preparation might be a little more complicated this year than usual for many Canadians…
Keep Remote Classes Safe and in Session: What You Need to Know About Netop Vision Pro
Read the original article: Keep Remote Classes Safe and in Session: What You Need to Know About Netop Vision Pro Keep Remote Classes Safe and in Session: What You Need to Know About Netop Vision Pro Distance and hybrid learning…
Netop Vision Pro – Distance Learning Software is 20/20 in Hindsight
Read the original article: Netop Vision Pro – Distance Learning Software is 20/20 in Hindsight The McAfee Labs Advanced Threat Research team is committed to uncovering security issues in both software and hardware to help developers provide safer products for…
Keep Remote Classes Safe and in Session: What You Need to Know About Netop Vision Pro
Read the original article: Keep Remote Classes Safe and in Session: What You Need to Know About Netop Vision Pro Keep Remote Classes Safe and in Session: What You Need to Know About Netop Vision Pro Distance and hybrid learning…
Operation Diànxùn: Cyberespionage Campaign Targeting Telecommunication Companies
Read the original article: Operation Diànxùn: Cyberespionage Campaign Targeting Telecommunication Companies In this report the McAfee Advanced Threat Research (ATR) Strategic Intelligence team details an espionage campaign, targeting telecommunication companies, dubbed Operation Diànxùn. In this attack, we discovered malware using…
McAfee Defender’s Blog: Operation Dianxun
Read the original article: McAfee Defender’s Blog: Operation Dianxun Operation Dianxun Overview In a recent report the McAfee Advanced Threat Research (ATR) Strategic Intelligence team disclosed an espionage campaign, targeting telecommunication companies, named Operation Diànxùn. The tactics, techniques and procedures…
TikTok Update: Dangerous Viral Challenges & Age Restrictions
Read the original article: TikTok Update: Dangerous Viral Challenges & Age Restrictions TikTok Update: Dangerous Viral Challenges & Age Restrictions It’s popular. It’s uplifting. It’s creative. It’s entertaining. It can also be risky. All these words equally describe TikTok, the…
True Security Requires a Holistic Approach
Read the original article: True Security Requires a Holistic Approach True Security Requires a Holistic Approach Driving along the coast, I sometimes wonder what makes a boat reliably float. After all, a leak can sometimes cripple even the largest vessel.…