Category: McAfee Blogs

McAfee Labs Report Highlights Ransomware Threats

This article has been indexed from McAfee Blogs The McAfee Advanced Threat Research team today published the McAfee Labs Threats Report: June 2021. In this edition we introduce additional context into the biggest stories dominating the year thus far including…

Watch Out for These 3 Online Job Scams

This article has been indexed from McAfee Blogs If you recently found yourself looking for a new job, you are far from alone. According to the Institute of Labor Economics, more Canadians were seeking new employment opportunities at the height of the pandemic than during the…

Do the Benefits of Bitcoin Outweigh the Risks?

This article has been indexed from McAfee Blogs What do Burger King and the popular “Doge” meme have in common? They both have cryptocurrencies named after their likeliness. WhopperCoin and Dogecoin are just two examples of the thousands of types of cryptocurrencies…

Transforming to a Predictive Cyber Defense

This article has been indexed from McAfee Blogs How much of the global economy is managed from a home network these days? Or, more importantly, what percentage of your company’s most sensitive data passes through employee home networks right now?…

7 Tips to Protect Your Smartphone from Getting Hacked

This article has been indexed from McAfee Blogs There’s little rest for your hard-working smartphone. If you’re like many professionals today, you use it for work, play, and a mix of personal business in between. Now, what if something went wrong with that phone, like…

Is Your Peloton Spinning Up Malware?

This article has been indexed from McAfee Blogs [Disclaimer: The McAfee ATR team disclosed this vulnerability to Peloton and promptly started working together to responsibly develop and issue a patch within the disclosure window. The patch was tested and confirmed effective on June…

A New Program for Your Peloton – Whether You Like It or Not

This article has been indexed from McAfee Blogs Executive Summary  The McAfee Advanced Threat Research team (ATR) is committed to uncovering security issues in both software and hardware to help developers provide safer products for businesses and consumers. As security researchers, something that we always…

How to Prepare for Your Child’s First Smartphone

This article has been indexed from McAfee Blogs If only more things in life came with training wheels; a child’s first smartphone could certainly use some.  Like taking off the training wheels and riding out into the neighborhood for the first time, a smartphone opens an entirely new…

Are Virtual Machines the New Gold for Cyber Criminals?

This article has been indexed from McAfee Blogs Introduction Virtualization technology has been an IT cornerstone for organization for years now. It revolutionized the way organizations can scale up IT systems in a heartbeat, allowing then to be more agile…

How to Teach Kids About Online Safety: A Guide

This article has been indexed from McAfee Blogs Kids are online now more than ever, not just during free time, but also during school time. It is impossible to always peek over their shoulder, and depending on their age, they may grow tired of a POS (aka parent…

Avoid Making Costly Mistakes with Your Mobile Payment Apps

This article has been indexed from McAfee Blogs There used to be a time when one roommate split the cost of rent with another by writing a check. Who still owns a checkbook these days? Of course, those days are nearly long gone, in large part thanks to “peer to peer”…

Apple Users: This macOS Malware Could Be Spying on You

This article has been indexed from McAfee Blogs In 2018, Macs accounted for 10% of all active personal computers. Since then, popularity has skyrocketed. In the first quarter of 2021, Macs experienced 115% growth when compared to Q1 2020, putting Apple in fourth place in the global PC…

8 Tips for Staying Safe from Ransomware Attacks

This article has been indexed from McAfee Blogs What is Ransomware? Over the past year, you may have seen the term ransomware popping up frequently. For enterprising hackers, this once uncommon tactic has become standard operating procedure, and with good…

The What, Why, and How of AI and Threat Detection

This article has been indexed from McAfee Blogs There are more online users now than ever before, thanks to the availability of network-capable devices and online services. The internet population in Canada is the highest it has been, topping the charts at…

A Safer Internet for You, Your Family, and Others Too

This article has been indexed from McAfee Blogs With so many of us relying on the internet in ways we simply haven’t before, it follows that a safer internet is more important than ever before too.   June marks Internet Safety Month, a time where we…

Potentially Malicious Apps Your Kids May Use

This article has been indexed from McAfee Blogs It’s a question I get several times a year from anxious parents, either via a direct message, an email or even in line at the grocery store. It goes something like this: “What’s the one thing you wish you’d done better when monitoring…

Happy Birthday GDPR!

This article has been indexed from McAfee Blogs Believe it or not, the baby turns 3 today! And like with every three-year-old, there is a lot to watch out for. Granted, when GDPR was born it was after a 2-year…

Alert Actionability In Plain English From a Practitioner

This article has been indexed from McAfee Blogs In response to the latest MITRE Engenuity ATT&CK® Evaluation 3, McAfee noted five capabilities that are must-haves for Sec Ops and displayed in the evaluation.  This blog will speak to the alert actionability capability which is essential. This critical ability to react in the fastest possible way, as early as possible…

Give CISOs a Shot – They Deserve It

This article has been indexed from McAfee Blogs Imagine this scenario: a CEO, CIO, CTO, CISO walk into a bar…    The CTO has heard about cocktails that go beyond the “pour and shake,” and asks the bartender what they know about molecular gastronomy to take their…

At Home or On-the-Go: Boost Your Internet Safety this Summer

This article has been indexed from McAfee Blogs Summer is here, which means more sun and more fun for everyone. It also means more streaming, gaming, and downloading. This seasonal reality reminds us that to enjoy the best of summer, it’s important to stay aware of…

Keep the Change: 3 Tips for Using the Twitter Tip Jar

This article has been indexed from McAfee Blogs When we think of tipping, many don’t see it as anything beyond a display of gratitude. However, Twitter’s latest feature is prompting its users to rethink this sentiment. It hasn’t been long since Twitter released their new Tip Jar feature, which allows users on the platform to send tips…

Data Localisation – The Magic Bullet?

This article has been indexed from McAfee Blogs In the wake of the Schrems II decision[1], and even more in the light of Friday’s Facebook ruling[2], the question on everyone’s mind is how to truly protect personal data from the…

Miles Wide & Feet Deep Visibility of Carbanak+FIN7

This article has been indexed from McAfee Blogs In our last blog about defense capabilities, we outlined the five efficacy objectives of Security Operations, that are most important for a Sec Ops; this blog will focus on Visibility. The MITRE…

Less Is More: Why One Antivirus Software Is All You Need

This article has been indexed from McAfee Blogs Personal devices and the information they carry are incredibly valuable to their owners. It is only natural to want to protect your device like a royal family fortifying a medieval castle. Unlike medieval castles…

Elevate Your Financial Security: How to Safely Bank Online

This article has been indexed from McAfee Blogs Today’s technology allows you to complete various tasks at the touch of a button wherever you go. As a result, you place trust in online services that make everyday chores more convenient without second-guessing their effects. One such service is online banking. More Canadians are doing their banking virtually with over…

CRN’s Women of the Channel 2021 Recognizes McAfee Leaders

This article has been indexed from McAfee Blogs Every year CRN recognizes the women who are leading the channel and their unique strengths, vision, and achievements. This year, CRN recognized five McAfee individuals on their prestigious list of those leading the channel. Those selected…

DarkSide Ransomware Victims Sold Short

This article has been indexed from McAfee Blogs Over the past week we have seen a considerable body of work focusing on DarkSide, the ransomware responsible for the recent gas pipeline shutdown. Many of the excellent technical write-ups will detail…

3 Tips to a Holistic Online Security Approach

This article has been indexed from McAfee Blogs Cybersecurity is often used as a blanket term to address online safety. Cybersecurity can refer to the software used to protect your devices, but it can also refer to the processes you put in place to…

5 Ways to Protect Your Online Privacy

This article has been indexed from McAfee Blogs When you open your laptop or your mobile device, what is the first thing you do? Do you head to your favorite social media site to skim the latest news, or do you place your weekly grocery…

Cloud Native Security Approach Comparisons

Vinay Khanna, Ashwin Prabhu & Sriranga Seetharamaiah also contributed to this article.  In the Cloud, security responsibilities are shared between the Cloud Service Provider (CSP) and Enterprise Security teams. To enable Security teams to provide compliance, visibility, and control across the…

Seeking Reconnection: Internet Usage and the Return to Travel

Even as the internet kept us connected with family and friends during the pandemic, people remain understandably eager to reconnect in person as vaccines roll out and restrictions ease. In fact, people are making travel plans accordingly. Nearly two-thirds (64%) of people worldwide said that they’re planning to travel for leisure…

How to Remain Secure While Using Running Apps

When gyms were forced to close last year, you likely looked for other ways to get some exercise and stay active during quarantine. From investing in a few pairs of dumbbells or perhaps downloading an app or two to help you track your workouts, you found…

Beware of Social Media Scams

Social media is a great place to connect with friends and family. Unfortunately, it is also a great place for misinformation to run rampant, and it is a virtual treasure chest for cybercriminals to steal personal information. Over 25 million…

McAfee Proactive Security Proves Effective in Recent MITRE ATT&CK™

McAfee Soars with Superior Protection Results    Bottom Line: McAfee stopped the MITRE ATT&CK Evaluation Carbanak and FIN7 threats in their tracks within the first 15% of the major steps of the attack chain (on average), delivering on a critical security operations center (SOC) strategy: Stop the attack…

How to Stop the Popups

McAfee is tracking an increase in the use of deceptive popups that mislead some users into taking action, while annoying many others.  A significant portion is attributed to browser-based push notifications, and while there are a couple of simple steps…

New Security Approach to Cloud-Native Applications

Read the original article: New Security Approach to Cloud-Native Applications With on-premises i […]Content was cut in order to protect the source.Please visit the source for the rest of the article. Read the original article: New Security Approach to Cloud-Native…

Lessons We Can Learn From Airport Security

Read the original article: Lessons We Can Learn From Airport Security Most of us don’t have responsibility for airports, but thinking about airport security can teach us lessons about how we consider, design and execute IT security in our enterprise.…

McAfee Defender’s Blog: Cuba Ransomware Campaign

Read the original article: McAfee Defender’s Blog: Cuba Ransomware Campaign Cuba Ransomware Overview Over the past year, we have seen ransomware attackers change the way they have responded to organizations that have either chosen to not pay the ransom or…

McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware

Read the original article: McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware Executive Summary  Cuba ransomware is an older ransomware, that has recently undergone some development. The actors have incorporated the leaking of victim data to increase its impact and revenue, much like we have…

Prioritizing Security in a Remote Learning Environment

Read the original article: Prioritizing Security in a Remote Learning Environment Prioritizing Security in a Remote Learning Environment  Learning environments are not what they used to be, and as educational institutions deploy new technology to facilitate a safe and effective…

Myth-busting Antivirus Software Assumptions

Read the original article: Myth-busting Antivirus Software Assumptions Myth-busting Antivirus Assumptions The number of new viruses grows every day. In fact, McAfee recently registered a 605% increase in total Q2 COVID-19 themed threat detections, contributing to the millions already in existence. While there is…

5 Ways MVISION XDR Innovates with MITRE ATT&CK

Read the original article: 5 Ways MVISION XDR Innovates with MITRE ATT&CK The MITRE ATT&CK® Framework proves that authority requires constant learning and the actionable information it contains has never held greater currency. Likewise, XDR, the category of extended detection and response…

McAfee Defender’s Blog: Operation Dianxun

Read the original article: McAfee Defender’s Blog: Operation Dianxun Operation Dianxun Overview In a recent report the McAfee Advanced Threat Research (ATR) Strategic Intelligence team disclosed an espionage campaign, targeting telecommunication companies, named Operation Diànxùn. The tactics, techniques and procedures…

TikTok Update: Dangerous Viral Challenges & Age Restrictions

Read the original article: TikTok Update: Dangerous Viral Challenges & Age Restrictions TikTok Update: Dangerous Viral Challenges & Age Restrictions It’s popular. It’s uplifting. It’s creative. It’s entertaining. It can also be risky. All these words equally describe TikTok, the…

True Security Requires a Holistic Approach

Read the original article: True Security Requires a Holistic Approach True Security Requires a Holistic Approach Driving along the coast, I sometimes wonder what makes a boat reliably float. After all, a leak can sometimes cripple even the largest vessel.…