Featured Blogs
Update on the Beebone Botnet Takedown
On April 8, the takedown operation for the polymorphic botnet known as Beebone successfully concluded. This action redirected traffic from...
Predictive Analytics: The Future Is Now
Enhanced analytical capabilities will help organizations better understand how attacks will unfold, and how to stop them in their earliest...
Verizon Report Foreshadows Breaches Originating With IoT Devices
This blog post was written by Rick Simon. Today, Verizon released its 2015 Data Breach Investigations Report (DBIR). As Verizon...
Taking a Close Look at Data-Stealing NionSpy File Infector
This blog was written by Sanchit Karve. W32/NionSpy is a family of malware that steals information from infected machines and...
VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials
Since the beginning of the year we have seen a spike in ransomware including the emergence of new ransomware families....
Takedown Stops Polymorphic Botnet
Several global law enforcement agencies—with assistance from McAfee —this week successfully dismantled the “Beebone” botnet behind a polymorphic worm known...
Defending Cyber-Physical Systems from Attack Chains
A strong defense against compromise involves three layers: hardening devices, securing communications, and monitoring behavior. If criminals breach data security...
POS Malware Uses Time-Stamp Check to Evade Detection
This blog post was written by Kumaraguru Velmurugan. Point of sale (POS) attacks appear to have gained in popularity during...
Protect Your Web Applications
Reverse proxies are critical to shield Web apps from external attacks. Many organizations today are concerned about how to safely...
Trend Countdown: My Top 5 Digital Marketing Trends to Watch
This blog post was written by Penny Baldwin. Marketers, take note: A killer digital marketing campaign is no longer about...