Author: McAfee

This blog is part of our SOCwise series where we’ll be digging into all things related to SecOps from a practitioner’s point of view, helping us enable defenders to both build context and confidence in what they do.  Although there’s been a lot of chatter about supply chain attacks, we’re going to bring you a slightly different […]

The post SOCwise Series: Practical Considerations on SUNBURST appeared first on McAfee Blogs.

Read More SOCwise Series: Practical Considerations on SUNBURST

data breach

ShinyHunters Exposes Over 125 Million Online Credentials   Meet ShinyHunters, a hacker who recently leaked 10 new databases this past month from companies including: • Pixlr.com • Bonobos.com • Wognai.com • Tesspring.com • Tunedglobal.com • Buyucoin.com • Wappalyzer.com • Chqbook.com • Rooter.io • MeetMindful.com But this isn’t the first time they’ve made headlines. It all started […]

The post ShinyHunters Exposes Over 125 Million Online Credentials appeared first on McAfee Blogs.

Read More ShinyHunters Exposes Over 125 Million Online Credentials

CES 2021

Typically, the International Consumer Electronics Show (CES) gives us a sense of where technology is going in the future. However, this year’s show was arguably more about technology catching up with how the COVID-19 pandemic has reshaped our lives. While gathering in person was not an option, we still had the opportunity to witness incredible […]

The post CES 2021: Highlights From the “Cleanest” Show Yet! appeared first on McAfee Blogs.

Read More CES 2021: Highlights From the “Cleanest” Show Yet!

The December 2020 revelations around the SUNBURST campaigns exploiting the SolarWinds Orion platform have revealed a new attack vector – the supply chain – that will continue to be exploited. The ever-increasing use of connected devices, apps and web services in our homes will also make us more susceptible to digital home break-ins. This threat […]

The post 2021 Threat Predictions Report appeared first on McAfee Blogs.

Read More 2021 Threat Predictions Report

Die Cloud ist und bleibt ein Treiber für die digitale Transformation. Nachdem der Fokus primär auf die Erkennung von Shadow-IT und die Absicherung von SaaS-Diensten lag, wandert nun der Blick auf längerfristige Projekte: Die Migration von ganzen Diensten und Anwendungen in Richtung Cloud. In diesem Podcast sprechen wir daher über die Themen Infrastruktur und Container […]

The post ST25: Absicherung von Cloud-nativen Anwendungen appeared first on McAfee Blogs.

Read More ST25: Absicherung von Cloud-nativen Anwendungen

Cybersecurity technology

Top Ten Tips for Protecting Your Identity, Finances, and Security Online Whether you’re working, banking, shopping, or just streaming a few shows online, these quick tips will make sure you’re more secure from hacks, attacks, and prying eyes. 1 – Protect your computers Start with the basics: get strong protection for your computers and laptops. […]

The post Top Ten Tips for Protecting Your Identity, Finances, and Security Online appeared first on McAfee Blogs.

Read More Top Ten Tips for Protecting Your Identity, Finances, and Security Online

Over the past 9 months, the world has grappled with the COVID-19 pandemic. We have all felt vulnerable. With borders closed and curfews and lockdowns instituted, things that we can count on, like reliable energy and technology, have become more essential than ever… Especially now that most of us have to conduct work from home, […]

The post Energy Company Fights Back with MVISION EDR as Covid-19 Increases Threat Campaigns appeared first on McAfee Blogs.

Read More Energy Company Fights Back with MVISION EDR as Covid-19 Increases Threat Campaigns

Truebill, Chargebee, Fusebill and other financial apps have been inundating my social feeds and until recently I didn’t understand why I would need one of these apps. I’m the type that knows her bank account  balance to the penny and I was shocked to discover that many of my co-workers and, of course, my college […]

The post What Truebill and Other Financial Apps Have in Common With EDR appeared first on McAfee Blogs.

Read More What Truebill and Other Financial Apps Have in Common With EDR

Today’s U.S. government is in a race to modernize its IT infrastructure to support ever more complicated missions, growing workloads and increasingly distributed teams—and do so facing a constantly evolving threat landscape. To support these efforts, McAfee has pursued and received a Federal Risk and Authorization Management Program (FedRAMP) Authorization designation for McAfee MVISION for […]

The post McAfee MVISION Solutions Meet FedRAMP Cloud Security Requirements appeared first on McAfee Blogs.

Read More McAfee MVISION Solutions Meet FedRAMP Cloud Security Requirements

There are new and expanding opportunities for women’s participation in cybersecurity globally as women are present in greater numbers in leadership. In recent years, the international community has recognized the important contributions of women to cybersecurity, however, equal representation of women is nowhere near a reality, especially at senior levels. The RSA Conference USA 2019 held […]

The post SPOTLIGHT: Women in Cybersecurity appeared first on McAfee Blogs.

Read More SPOTLIGHT: Women in Cybersecurity

McAfee MVISION Cloud was the first to market with a CASB solution to address the need to secure corporate data in the cloud. Since then, Gartner has published several reports dedicated to the CASB market, which is a testament to the critical role CASBs play in enabling enterprise cloud adoption. Today, Gartner named McAfee a […]

The post McAfee Named a Leader in the 2020 Gartner Magic Quadrant for CASB appeared first on McAfee Blogs.

Read More McAfee Named a Leader in the 2020 Gartner Magic Quadrant for CASB

Halloween scams

Trick or Treat: Avoid These Spooky Threats This Halloween Spooky season is among us, and ghosts and goblins aren’t the only things hiding in the shadows. Online threats are also lurking in the darkness, preparing to haunt devices and cause some hocus pocus for unsuspecting users. This Halloween season, researchers have found virtual zombies and witches […]

The post Trick or Treat: Avoid These Spooky Threats This Halloween appeared first on McAfee Blogs.

Read More Trick or Treat: Avoid These Spooky Threats This Halloween

 When something goes wrong with your computer or devices, it can cause a panic. After all, most of us depend on technology not only to work and connect with others, but also to stay on top of our daily lives. That’s why tech support scams are often successful. They appear to offer help when […]

The post How To Spot Tech Support Scams appeared first on McAfee Blogs.

Read More How To Spot Tech Support Scams

Vor dem Hintergrund des IT-Fachkräftemangels gestaltet es sich für Unternehmen immer schwieriger, mit der wachsenden Zahl sowie Raffinesse von Cyber-Angriffen Schritt zu halten und drängt Sicherheitsteams dazu, oft nur noch reaktiv agieren zu können. Wie Sie mithilfe einer umfassenden Bedrohungsdatenbank sowie proaktiver Reaktionsmaßnahmen Ihre Endgerätesicherheit verbessern und Reaktionszeiten von Monaten auf Stunden verkürzen können, diskutieren […]

The post ST24: Proaktive Absicherung zur Minimierung von Endgeräterisiken (German) appeared first on McAfee Blogs.

Read More ST24: Proaktive Absicherung zur Minimierung von Endgeräterisiken (German)

McAfee “Most Famous to Most Dangerous to Search for Online” 2020 MDC Sweepstakes Terms and Conditions NO PURCHASE OR PAYMENT OF ANY KIND NECESSARY TO ENTER OR WIN. A PURCHASE WILL NOT INCREASE YOUR CHANCES OF WINNING. THIS SWEEPSTAKES IS INTENDED FOR PLAY IN THE UNITED STATES ONLY AND VOID IN FLORIDA, NEW YORK, AND […]

The post Most Dangerous Celebrity 2020 Sweepstakes appeared first on McAfee Blogs.

Read More Most Dangerous Celebrity 2020 Sweepstakes

#BeCyberSmart

Cybersecurity Awareness Month: If You Connect It, Protect It October is Cybersecurity Awareness Month, which is led by the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA) in conjunction with the National Cyber Security Alliance (NCSA)—a national non-profit focused on cybersecurity education & awareness. McAfee is pleased to announce that we’re a proud participant. We […]

The post Cybersecurity Awareness Month: If You Connect It, Protect It appeared first on McAfee Blogs.

Read More Cybersecurity Awareness Month: If You Connect It, Protect It

Network Products Guide, the industry’s leading technology research and advisory guide, recently named the winners in their 15th Annual 2020 Network PG’s IT World Awards. Judges from a broad spectrum of industry voices around the world participated and their average scores determined the 2020 award winners.  McAfee took center stage with three wins, including Gold […]

The post McAfee Leapfrogs Competition with trio of awards at 2020 IT World Awards appeared first on McAfee Blogs.

Read More McAfee Leapfrogs Competition with trio of awards at 2020 IT World Awards

Für viele ist das Arbeiten im Home Office zur Normalität geworden. Microsoft Teams stellt dabei den Ankerpunkt der effektiven Zusammenarbeit und dem Austausch von Inhalten in Microsoft 365 dar. Welche Auswirkung das jedoch auf die Sicherheit hat, diskutieren wir in diesem Podcast. Hierfür zusammengekommen sind Alexander Haug, unser Security Engineer mit Fokus auf Data Protection, […]

The post ST23: Moderner Datenschutz für Microsoft Teams (German) appeared first on McAfee Blogs.

Read More ST23: Moderner Datenschutz für Microsoft Teams (German)

Cybersecurity Awareness Month

Cybersecurity Awareness Month Helps Us All be #BeCyberSmart October is Cybersecurity Awareness Month, which is led by the National Cyber Security Alliance (NCSA)—a national non-profit focused on cybersecurity education & awareness in conjunction with the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA). McAfee is pleased to announce that we’re a proud participant. If there’s […]

The post Cybersecurity Awareness Month Helps Us All be #BeCyberSmart appeared first on McAfee Blogs.

Read More Cybersecurity Awareness Month Helps Us All be #BeCyberSmart

Strong Passwords

Announcing McAfee’s Enhanced Consumer Security for New Consumer Realities With millions of people continuing to work and study remotely, scammers have followed them home—generating an average of 375 new threats per minute so far this year. In response, our enhanced consumer portfolio directly addresses the new needs and new threats people face. McAfee Labs found that […]

The post Evolving Security Products for the new Realities of Living Life From Home appeared first on McAfee Blogs.

Read More Evolving Security Products for the new Realities of Living Life From Home

email phishing scams

Phishing Email Examples: How to Recognize a Phishing Email Keeping your identity safe on the internet can be challenging. Phishing is a scam that tricks you into voluntarily providing important personal information. Protect yourself from phishing by reviewing some examples of phishing emails and learning more about this common online scam. What is phishing? Phishing […]

The post Phishing Email Examples: How to Recognize a Phishing Email appeared first on McAfee Blogs.

Read More Phishing Email Examples: How to Recognize a Phishing Email

The Latest on the Uber Data Breach and Protecting Your Info You may have spotted the news last week that U.S. federal prosecutors brought charges against the former chief security officer of Uber. At issue was a breach that occurred in 2016, where prosecutors allege that he covered up a $100,000 payoff to the hackers […]

The post Uber Data Breach and How to Protect Your Info appeared first on McAfee Blogs.

Read More Uber Data Breach and How to Protect Your Info

 What is GPS spoofing? Global positioning system (GPS) technology is now the standard way for travelers to efficiently get from point A to point B. While GPS delivers unparalleled opportunities to businesses and individuals, there are some drawbacks to using this technology. GPS devices can be vulnerable to cyber attacks through GPS spoofing. GPS Spoofing […]

The post What is GPS spoofing? appeared first on McAfee Blogs.

Read More What is GPS spoofing?