McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and the National Space Center (NSC) in Cork, Ireland The essence of Space 4.0 is the introduction of smaller, cheaper, faster-to-the-market satellites in low-earth-orbit into the value chain and the exploitation of the data they provide. […]
The post Securing Space 4.0 – One Small Step or a Giant Leap? Part 1 appeared first on McAfee Blogs.
Read More Securing Space 4.0 – One Small Step or a Giant Leap? Part 1
McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and the National Space Center in Cork, Ireland In the first of this two-part blog series we introduced Space 4.0, its data value and how it looks set to become the next battleground in the defense […]
The post Securing Space 4.0 – One Small Step or a Giant Leap? Part 2 appeared first on McAfee Blogs.
Read More Securing Space 4.0 – One Small Step or a Giant Leap? Part 2
We’ve all been spending more of our time online since the crisis hit. Whether it’s ordering food for delivery, livestreaming concerts, holding virtual parties, or engaging in a little retail therapy, the digital interactions of many Americans are on the rise. This means we’re also sharing more of our personal and financial information online, with…
The post Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis appeared first on .
Read More Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis
Advanced and Persistent Threats are often inoculated by emails or by exploiting exposed vulnerabilities. Since vulnerability exploitation follows specific waves, it depends on vulnerability trends, the email vector become one of the most (ab)used and stable way to inoculate Malicious and unwanted software. A common way to attack victims is to make her open an […]
Read More Tracking PhishingKits for Hunting APT Evolution
Election 2020 – Five Tips to Secure a Mail-In Ballot That Counts Forecasts predict that roughly 80 million votes will get cast by mail-in ballots—double the number cast by mail in the 2016 election. Here are a couple tips to make sure your vote counts for the 2020 election. Smart use of the internet will […]
The post Election 2020 – Five Tips to Secure a Mail-In Ballot That Counts appeared first on McAfee Blogs.
Read More Election 2020 – Five Tips to Secure a Mail-In Ballot That Counts
Cybersecurity Awareness Month Helps Us All be #BeCyberSmart October is Cybersecurity Awareness Month, which is led by the National Cyber Security Alliance (NCSA)—a national non-profit focused on cybersecurity education & awareness in conjunction with the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA). McAfee is pleased to announce that we’re a proud participant. If there’s […]
The post Cybersecurity Awareness Month Helps Us All be #BeCyberSmart appeared first on McAfee Blogs.
Read More Cybersecurity Awareness Month Helps Us All be #BeCyberSmart
In Privacy Is Power, professor Carissa Véliz has made a shocking survey of how much intimate data we are surrendering. But she has a plan to fight back“If you’re reading this book, you probably already know your personal data is being collected, stored…
Read More Give up Google, don’t hit ‘accept all’: how to fight for your privacy
8 Ways to Help Senior Adults Stay Safe Online These Days Technology has come in handy for most of us during these days of pandemic distancing. But for the -at-risk, homebound senior population, technology has been a lifeline connecting them to family members, online services, and healthcare. Still, this unprecedented shift to virtual life has […]
The post 8 Ways to Help Senior Adults Stay Safe Online These Days appeared first on McAfee Blogs.
Read More 8 Ways to Help Senior Adults Stay Safe Online These Days
Stay Connected & Protected: Weaving Security Into Our Social Media Habits Today, there are so many different avenues where we receive information. Personally, I prefer finding out what’s going on in the world by scanning my favorite news channels’ websites and by receiving personalized feeds and notifications to my phone. My wife, however, scans social […]
The post Stay Connected & Protected: Weaving Security Into Our Social Media Habits appeared first on McAfee Blogs.
Read More Stay Connected & Protected: Weaving Security Into Our Social Media Habits
Maximizing the value of your application security (AppSec) analytics not only provides a window into whether or not you???re meeting security requirements but also it helps you prove your ROI. That can be a challenge for a lot of organizations ??? when…
Read More Watch Here: Using Analytics to Measure AppSec ROI
Career change? Cybersecurity companies are hiring. If you’re thinking career change or career shift, there’s a field that has an estimated 4 million jobs open. Cybersecurity. According to survey and research data from the International Cybersecurity Organization (ICS)2, there’s a cybersecurity workforce gap—a terrifically high volume of jobs left unfilled. Published in 2019, the gap […]
The post Career change? Cybersecurity companies are hiring. appeared first on McAfee Blogs.
Read More Career change? Cybersecurity companies are hiring.
McAfee’s Global Business Development Manager, Greg Vinson and CEO of Attivo Networks, Tushar Kothari discuss the solutions to Threat Deception.
The post ST22: Attivo Networks with Greg Vinson & Tushar Kothari appeared first on McAfee Blogs.
Read More ST22: Attivo Networks with Greg Vinson & Tushar Kothari
McAfee MVISION Cloud for Microsoft Teams, now offers secure guest user collaboration features allowing the security admins to not only monitor sensitive content posted in the form of messages and files within Teams but also monitor guest users joining Teams to remove any unauthorized guests joining Teams. Working from home has become a new reality for many, as more and more […]
The post MVISION Cloud for Microsoft Teams appeared first on McAfee Blogs.
Read More MVISION Cloud for Microsoft Teams
U.S. Election 2020 – Don’t Let COVID-19 Misinformation Suppress Your Vote In the early days of the COVID-19 pandemic, another pandemic of sorts took root—this one an “infodemic.” Whether designed to mislead, instill fear, capitalize on crank remedies, or push phony cures that caused harm or worse, millions of outright false stories about COVID-19 proliferated […]
The post U.S. Election 2020 – Don’t Let COVID-19 Misinformation Suppress Your Vote appeared first on McAfee Blogs.
Read More U.S. Election 2020 – Don’t Let COVID-19 Misinformation Suppress Your Vote
Posted by Haining Chen, Vishwath Mohan, Kevin Chyn and Liz Louis, Android Security Team[Cross-posted from the Android Developers Blog] As phones become faster and smarter, they play increasingly important roles in our lives, functioning as our extended…
Read More Lockscreen and Authentication Improvements in Android 11
When investing in an application security (AppSec) program, you expect to see a return on your investment. But in order to recognize a return, your organization needs to determine what success looks like and find a way to measure and prove that the pro…
Read More Focus on Fixing, Not Just Finding, Vulnerabilities
Special Delivery: Don’t Fall for the USPS SMiShing Scam According to Statista, 3.5 billion people worldwide are forecasted to own a smartphone by the end of 2020. These connected devices allow us to have a wealth of apps and information constantly at our fingertips – empowering us to remain in constant contact with loved ones, […]
The post Special Delivery: Don’t Fall for the USPS SMiShing Scam appeared first on McAfee Blogs.
Read More Special Delivery: Don’t Fall for the USPS SMiShing Scam
Theoretical physicist Stephen Hawking was spot on when he said, ???Whether you want to uncover the secrets of the universe, or you just want to pursue a career in the 21st century, basic computer programming is an essential skill to learn.??? It???s no…
Read More 16% of Orgs Require Developers to Self-Educate on Security
Posted by Daniel Rubery, Software Engineer, Chrome, Ryan Rasti, Software Engineer, Safe Browsing, and Eric Mill, Product Manager, Chrome SecurityGoogle’s Advanced Protection Program helps secure people at higher risk of targeted online attacks, like jo…
Read More Improved malware protection for users in the Advanced Protection Program
Fingerprints are a great means for proving you are (or are not) who you say you are, and we’ve spent the past 2,200 years making progressively greater use of them. Nowadays, we can use digital technology to collect fingerprints for tasks like getting i…
Read More Spotlight: The Challenges of Contactless Fingerprinting
Announcing McAfee’s Enhanced Consumer Security for New Consumer Realities With millions of people continuing to work and study remotely, scammers have followed them home—generating an average of 375 new threats per minute so far this year. In response, our enhanced consumer portfolio directly addresses the new needs and new threats people face. McAfee Labs found that […]
The post Evolving Security Products for the new Realities of Living Life From Home appeared first on McAfee Blogs.
Read More Evolving Security Products for the new Realities of Living Life From Home
Phishing Email Examples: How to Recognize a Phishing Email Keeping your identity safe on the internet can be challenging. Phishing is a scam that tricks you into voluntarily providing important personal information. Protect yourself from phishing by reviewing some examples of phishing emails and learning more about this common online scam. What is phishing? Phishing […]
The post Phishing Email Examples: How to Recognize a Phishing Email appeared first on McAfee Blogs.
Read More Phishing Email Examples: How to Recognize a Phishing Email
Sensitive data exposure is currently at number 3 in the??ｯOWASP Top 10??ｯlist of the most critical application security risks.
In this blog post, we will describe common scenarios of incorrect sensitive data handling and suggest ways to protect sensit…
Read More Write Code That Protects Sensitive User Data
It???s no secret that the rapid speed of modern software development means an increased likelihood of risky flaws and vulnerabilities in your code. Developers are working fast to hit tight deadlines and create innovative applications, but without the r…
Read More 43% of Orgs Think DevOps Integration Is Critical to AppSec Success
Technology is constantly changing and advancing. Payment platforms are no exception. As these new platforms emerge, the software supporting the platform must be reliable and secure. Without secure payment platforms, payment transactions and data could …
Read More The Migration From PA-DSS to SSF: Everything You Need to Know
It was the day before a holiday break, and everyone was excited to have a few days off to spend with friends and family. A skeleton crew was managing the security operations center, and it seemed as though every other team left early to beat the holida…
Read More Why Application Security is Important to Vulnerability Management
It’s hard to believe, right, parents? In just a blink or two, you went from being the teenager dropping cool phrases like “rad” and “gnarly” to monitoring a teenager texting words like “lowkey,” “IRL” and “CD9” into her smartphone non-stop.* For generations, teens have been crafting terms to differentiate themselves from other age groups. The difference today is that […]
The post Can You Decode Your Teen’s Texting Language? appeared first on McAfee Blogs.
Read More Can You Decode Your Teen’s Texting Language?
2020 has propelled us into a new digital reality – one where we are reliant on technology to help us maintain our way of life. This forced all age groups, from 8-80, to learn how to conduct their day-to-day online. I personally had my mother asking a million questions about how to video conference! But while […]
The post Telehealth, Distance Learning, & Online Banking: Securing Digital Frontiers appeared first on McAfee Blogs.
Read More Telehealth, Distance Learning, & Online Banking: Securing Digital Frontiers
At McAfee, we support team members who are passionate about giving back. You are encouraged and empowered to make a substantial impact in improving our community and volunteering to help others. Piyush, a Software architect in our Bangalore office, is a team member particularly passionate about his community and has dedicated countless hours volunteering at the Sheila Kothavala Institute for the Deaf (SKID). Two years ago, his impact was multiplied when he shared his volunteer story during McAfee’s Social Initiative Contest (SIC), a […]
The post How Piyush’s remarkable efforts ignited a larger impact of giving back appeared first on McAfee Blogs.
Read More How Piyush’s remarkable efforts ignited a larger impact of giving back
When it comes to application security (AppSec), it???s important to note that no one testing type can uncover every flaw. Each tool is designed with a different area of focus, along with various speeds and costs ??? so it???s necessary to employ a mix …
Read More AppSec Tools Proliferation Is Driving Investments to Consolidate
As a leader in cybersecurity, we at McAfee understand that every aspect of your digital life has potential weak spots that could make you vulnerable to threats and attacks. By incorporating security into everything you do online, you’re better protected from potential threats. To mount your offense, we’ve enlisted a team of partners that puts […]
The post Together, We Block and Tackle to Give You Peace of Mind appeared first on McAfee Blogs.
Read More Together, We Block and Tackle to Give You Peace of Mind
In light of the current pandemic, most organizations will be working remotely for the foreseeable future. But the increase in virtual operations has led to a higher volume of cyberattacks.
Now, more than ever, it???s vital that your organization is ar…
Read More Gartner Summit: Balance Risk, Trust, and Opportunity in an Uncertain World
In this article, we explain how dangerous an unrestricted view name manipulation in Spring Framework could be. Before doing so, lets look
at the simplest Spring application that uses Thymeleaf as a templating engine:
Read More Spring View Manipulation Vulnerability
The FBI intrusion notification program is one of the most important developments in cyber security during the last 15 years. This program achieved mainstream recognition on 24 March 2014 when Ellen Nakashima reported on it for the Washington Post …
Read More The FBI Intrusion Notification Program
When I was a threat analyst, too long ago for me to actually put in writing, I remember the thrill of discovery at the apex of the boredom of investigation. We all know that meme: And over the years, investigation leads became a little more substantial. It would begin in one of a few […]
The post What A Threat Analyst Really Thinks of Intelligence appeared first on McAfee Blogs.
Read More What A Threat Analyst Really Thinks of Intelligence
Written by Sarah Doherty, Product Marketing Manager at iland Around the world, IT teams are struggling with choosing between less critical, but important tasks, versus focusing on innovative projects to help transform your business. Both are nece…
Read More The DRaaS Data Protection Dilemma
Guest article by Adrian Taylor, Regional VP of Sales for A10 Networks Distributed Denial of Service (DDoS) attacks are now everyday occurrences. Whether you’re a small non-profit or a huge multinational conglomerate, your online services—email, …
Read More Top Five Most Infamous DDoS Attacks
As Congress prepares to return to Washington in the coming weeks, finalizing the FY2021 National Defense Authorization Act (NDAA) will be a top priority. The massive defense bill features several important cybersecurity provisions, from strengthening CISA and promoting interoperability to creating a National Cyber Director position in the White House and codifying FedRAMP. These are […]
The post NDAA Conference: Opportunity to Improve the Nation’s Cybersecurity Posture appeared first on McAfee Blogs.
Read More NDAA Conference: Opportunity to Improve the Nation’s Cybersecurity Posture
A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, August 2020.Taking security training courses and passing certification exams are common ingredients in th…
Read More Cyber Security Roundup for September 2020
Posted by Marc Henson, Lead and Program Manager, Trust & Safety; Anna Hupa, Senior Strategist, at GoogleIt has been two years since we officially expanded the scope of Google’s Vulnerability Reward Program (VRP) to include the identification of pro…
Read More Announcing new reward amounts for abuse risk researchers
Open Source projects are the building blocks of any software development process. As we indicated in our previous blog, as more and more products use open source code, the increase in the overall attack surface is inevitable, especially when open source code is not audited before use. Hence it is recommended to thoroughly test it […]
The post Vulnerability Discovery in Open Source Libraries: Analyzing CVE-2020-11863 appeared first on McAfee Blogs.
Read More Vulnerability Discovery in Open Source Libraries: Analyzing CVE-2020-11863
I published a new book!The Best of TaoSecurity Blog, Volume 2: Network Security Monitoring, Technical Notes, Research, and China and the Advanced Persistent ThreatIt’s in the Kindle Store, and if you’re Unlimited it’s free. Print edition to follo…
Read More New Book! The Best of TaoSecurity Blog, Volume 2