August 2020

Teaching Kids Internet Safety

The First Smartphone for Free-Ranging Kids In an earlier article, we took a look at smartphone alternatives for free-ranging kids. Next up is the follow-on conversation … the time you give them their first, fully functional smartphone—and how to manage having it in your lives. For children, learning to use a first smartphone is just […]

The post The First Smartphone for Free-Ranging Kids appeared first on McAfee Blogs.

Read More The First Smartphone for Free-Ranging Kids

The Latest on the Uber Data Breach and Protecting Your Info You may have spotted the news last week that U.S. federal prosecutors brought charges against the former chief security officer of Uber. At issue was a breach that occurred in 2016, where prosecutors allege that he covered up a $100,000 payoff to the hackers […]

The post Uber Data Breach and How to Protect Your Info appeared first on McAfee Blogs.

Read More Uber Data Breach and How to Protect Your Info

It was every administrator’s worst nightmare. A small district hospital in western Colorado lost access to 5 years’ worth of patient records after ransomware attackers exploited holes in an aging infrastructure to strike. But it was also an increasingly familiar story as ransomware attackers escalate their attacks and go after targets across all sectors of […]

The post Why Ransomware Targets No Longer Need to Wind Up as Ransomware Victims appeared first on McAfee Blogs.

Read More Why Ransomware Targets No Longer Need to Wind Up as Ransomware Victims

Ransomware Evolution to Most Promising Victim (MPV) Attacks Ransomware cost businesses over $11.5 B with a 500% increase in attacks in 2019 according to Forrester Research. It’s your persistent threat.   Ransomware is a type of malicious software that infects a computer and restricts users’ access to it and their data until a ransom is paid […]

The post Understand and Manage Pesky Persistent Threats appeared first on McAfee Blogs.

Read More Understand and Manage Pesky Persistent Threats

Cybercriminals tend to keep with the times, as they often leverage current events as a way to harvest user data or spread malicious content. McAfee COVID-19 Threat Report July 2020 points to a rather significant surge in attacks exploiting the current pandemic with COVID-19 themed malicious apps, phishing campaigns, malware, and ransomware. However, what many users don’t realize is that ransomware attacks are a […]

The post Ransomware Could Be the New Data Breach: 5 Tips to Stay Secure appeared first on McAfee Blogs.

Read More Ransomware Could Be the New Data Breach: 5 Tips to Stay Secure

 What is GPS spoofing? Global positioning system (GPS) technology is now the standard way for travelers to efficiently get from point A to point B. While GPS delivers unparalleled opportunities to businesses and individuals, there are some drawbacks to using this technology. GPS devices can be vulnerable to cyber attacks through GPS spoofing. GPS Spoofing […]

The post What is GPS spoofing? appeared first on McAfee Blogs.

Read More What is GPS spoofing?

The McAfee team is very proud to announce that once again McAfee was named a Gartner Peer Insights Customers’ Choice for SIEM for its McAfee Enterprise Security Manager (ESM) Solution, a recognition of high satisfaction from a number of reviews by verified end-user professionals. We are most appreciative of our customers who support our solutions and share […]

The post McAfee ESM Named a 2020 Gartner Peer Insights Customers’ Choice for SIEM appeared first on McAfee Blogs.

Read More McAfee ESM Named a 2020 Gartner Peer Insights Customers’ Choice for SIEM

According to the Yoroi annual cyber security report (available HERE), to Cyber Threat Trends (available HERE) and to many additional resources, Microsoft Office files (Word documents and Excel spreadsheet) are one of the most used malware loaders in the current era. Attackers lure victims, by seducing them to open a specially crafted Office document, which […]

Read More How to Reverse Office Droppers: Personal Notes

“Features are a nice to have, but at the end of the day, all we care about when it comes to our web and cloud security is architecture.” – said no customer ever. The fact is that nobody likes to talk about architecture when shopping for the latest and greatest cyber security technology, and most […]

The post Transform your Architecture for the Cloud with MVISION UCE and SD-WAN appeared first on McAfee Blogs.

Read More Transform your Architecture for the Cloud with MVISION UCE and SD-WAN

There are 3,4 million digital payment system users worldwide. This figure is almost equal to the number of social media users globally and the half of word’s population to date….

The post eCommerce Payment System – How to Choose the Best One for Your eCommerce Startup? appeared first on Hacker Combat.

Read More eCommerce Payment System – How to Choose the Best One for Your eCommerce Startup?