A Dummies Guide to ‘Insider Trading’ via Botnet, Part 2
This post, the second of two parts, was written by Christiaan Beek, Raj Samani, and Shane Shook. In our first post,...
A Dummies Guide to ‘Insider Trading’ via Botnet
This post, the first of two parts, was written by Raj Samani, Christiaan Beek, and Shane Shook. Want to spread...
2016 Cybersecurity Predictions Report Examines Growth in Integrity Attacks
Cybersecurity changes rapidly. Those with valuable insights can better prepare for the shifting risks and opportunities. McAfee has just released the McAfee...
5 Quick Safety Hacks to Protect Your Kids Online
Being a parent in a socially networked world is likely one of the toughest challenges you will face. In the thick of...
Are We Really Expressing Ourselves on Social Media, Or Are We Too Scared?
When social media really took off about 10 years ago, I think many of us assumed that it might just...
Hacking the Human OS: A Report on Social Engineering
Why are data breaches so commonplace? Whether the attacks are against the energy sector as reported July 2014[i] with over...
McAfee Adds Flash Exploit Detection to NSP 8.2
Adobe Flash vulnerabilities and exploits have worried users and security professionals for many years. The situation today remains serious. A...
At McAfee, Protecting Customers Takes Precedence Over Seeking Headlines
One question I often hear is “When will McAfee publish a report on the latest threat?” It seems to be...
Exploit Kits Improve Evasion Techniques
Exploit kits are toolkits that malicious developers use to take advantage of client-side vulnerabilities, targeting web browsers and programs that...
New Exploit of Sandworm Zero-Day Could Bypass Official Patch
Update of October 25: Some comments posted after we published this report suggest that our proof-of-concept exploit will trigger the...