Category Archives: internet security

Top cybersecurity facts, figures and statistics for 2018

Looking for hard numbers to back up your sense of what’s happening in the cybersecurity world? We dug into studies and surveys of the industry’s landscape to get a sense

The post Top cybersecurity facts, figures and statistics for 2018 appeared first on The Cyber Security Place.

As Search Engines Blacklist Fewer Sites, Users More Vulnerable to Attack

Turns out, it’s a lot harder for a website to get blacklisted than one might think. A new study found that while the number of bot malware infected websites remained steady in Q2 of 2018, search engines like Google and Bing are only blacklisting 17 percent of infected websites they identify. The study analyzed more than six million websites with malware scanners to arrive at this figure, noting that there was also a six percent decrease in websites being blacklisted over the previous year.

Many internet users rely on these search engines to flag malicious websites and protect them as they surf the web, but this decline in blacklisting sites is leaving many users just one click away from a potential attack. This disregard of a spam attack kit on search engine results for these infected sites can lead to serious disruption, including a sharp decline in customer trust. Internet users need to be more vigilant than ever now that search engines are dropping the ball on blacklisting infected sites, especially considering that total malware went up to an all-time high in Q2, representing the second highest attack vector from 2017-2018, according to the recent McAfee Labs Threats Report.

Another unsettling finding from the report was that incidents of cryptojacking have doubled in Q2 as well, with cybercriminals continuing to carry out both new and traditional malware attacks. Cryptojacking, the method of hijacking a browser to mine cryptocurrency, saw quite a sizable resurgence in late 2017 and has continued to be a looming threat ever since. McAfee’s Blockchain Threat Report discovered that almost 30,000 websites host the Coinhive code for mining cryptocurrency with or without a user’s consent—and that’s just from non-obfuscated sites.

And then, of course, there are just certain search terms that are more dangerous and leave you more vulnerable to malware than others. For all of you pop culture aficionados, be careful which celebrities you digitally dig up gossip around. For the twelfth year in a row, McAfee researched famous individuals to assess their online risk and which search results could expose people to malicious sites, with this year’s Most Dangerous Celebrity to search for being “Orange is the New Black’s” Ruby Rose.

So, how can internet users protect themselves when searching for the knowledge they crave online, especially considering many of the most popular search engines simply aren’t blacklisting as many bot malware infected sites as they should be? Keep these tips in mind:

  • Turn on safe search settings. Most browsers and search engines have a safe search setting that filters out any inappropriate or malicious content from showing up in search results. Other popular websites like iTunes and YouTube have a safety mode to further protect users from potential harm.
  • Update your browsers consistently. A crucial security rule of thumb is always updating your browsers whenever an update is available, as security patches are usually included with each new version. If you tend to forget to update your browser, an easy hack is to just turn on the automatic update feature.
  • Be vigilant of suspicious-looking sites. It can be challenging to successfully identify malicious sites when you’re using search engines but trusting your gut when something doesn’t look right to you is a great way of playing it safe.
  • Check a website’s safety rating. There are online search tools available that will analyze a given URL in order to ascertain whether it’s a genuinely safe site to browse or a potentially malicious one infected with bot malware and other threats.
  • Browse with security protection. Utilizing solutions like McAfee WebAdvisor, which keeps you safe from threats while you search and browse the web, or McAfee Total Protection, a comprehensive security solution that protects devices against malware and other threats, will safeguard you without impacting your browsing performance or experience.

To keep abreast of the latest consumer and mobile security threats, be sure to follow me and @McAfee_Home on Twitter, listen to our podcast Hackable? and ‘Like’ us on Facebook.

The post As Search Engines Blacklist Fewer Sites, Users More Vulnerable to Attack appeared first on McAfee Blogs.

Aussie Ruby Rose is McAfee’s Most Dangerous Celebrity

Keeping up to date with celebrity gossip is a sport for many of us. Staying on top of what your favourite celebrity wore to the latest Hollywood shindig and, of course who they were with can be very time consuming and often require extensive searching! But did you know that searching for your favourite celebrity can actually put your personal security at risk?

Every year McAfee, the device-to-cloud cybersecurity company, undertakes global research, entitled Most Dangerous Celebrities, to identify which celebrities generate the riskiest search results which could potentially expose fans to malicious websites and risky downloads. And in 2018, the top spot was filled for the first time ever by an Australian celebrity: actress and television presenter Ruby Rose.

The very talented Ruby Rose kicked off her career as a hugely popular VJ (video jockey) on MTV. Before long, she went on to enjoy great success as a model, television presenter and then actress with her role as Stella Carlin in the cult series Orange Is The New Black. Ruby’s casting as Batwoman in the upcoming television series would have no doubt assisted in propelling her to first position.

Who Are the Most Dangerous Celebrities to Search For in 2018?

In the global list of Most Dangerous Celebrities, American reality TV star, Kristin Cavallari finished behind Rose at No. 2, followed by French actress Marion Cotillard (No. 3), the original Wonder Woman Lynda Carter (No. 4), Aussie actress Rose Byrne (No. 5), star of Will and Grace Debra Messing (No. 6), reality TV star Kourtney Kardashian (No. 7), actress Amber Heard (No. 8), American morning TV show host Kelly Ripa (No. 9), and finally Orange Is The New Black actor, Brad William Henke round out the top 10.

American actress Lucy Liu topped Australia’s list of the Most Dangerous Celebrities to search for. The top 10 list was littered with Aussie celebrities as well, including Naomi Watts (No. 2), Cate Blanchett (No 4.), Elle Macpherson (No.9) and Margot Robbie (No.10).

Interestingly, Aussie morning TV show host Sonya Kruger came in at number 17 on the list, a notable mention after appearing alongside other Australian TV stars, such as Carrie Bickmore and Georgie Gardiner in the recent fake Facebook ads scamming unsuspecting victims into purchasing face cream subscriptions. The recent Facebook scam demonstrates how cybercriminals capitalise on our love of celebrity when trying to trap unsuspecting consumers into scams.

Cybercriminals Capitalise on our ‘Celebrity Culture’

Online scammers and cybercriminals are always looking at new ways to get their hands on our private information with the aim of making big bucks. Tapping into our love of celebrity, cybercriminals will create professional looking websites that contain downloads which contain spyware or malware. These malicious celebrity sites may also require users to set up an account. Unsuspecting visitors will then provide their email addresses and passwords to the site not realising that their details have been compromised.

Our fast-paced modern lives mean that we often cut corners in the name of speed and convenience. Some of us are just so keen to view the promised content about our favourite celebrity that we drop our guard and don’t take the time to ensure the site is legitimate.

But not taking the time to ensure a link is safe means fans are not only putting their devices at risk of infection from viruses, but themselves at risk of identity theft.

How to Avoid Being Targeted by a Cyber Criminal

One of the best ways of staying safe online and avoiding falling victim to a scam is to adopt safe searches practices. Here are my top tips to ensure you stay out of trouble!

1. Think Before You Click

Users looking for a sneak-peek of Ruby Rose’s upcoming Batwoman series should be cautious and only download directly from a reliable source. The safest thing to do is to wait for the official release instead of visiting a third-party website that could contain malware.

2. Apply Updates as Soon as they are Available

Device and app updates will often include security fixes. Applying updates is an important step to help ensure devices stay protected.

3. Browse with Security Protection

Searching and browsing without security software is a little like navigating a foreign city with any guidelines. McAfee Total Protection is a comprehensive security solution that can help keep devices protected against malware, phishing attacks, and other threats. It includes McAfee WebAdvisor which can help identify malicious websites – very helpful!

4. Use Parental Control Software

Kids are fans of celebrities too, so ensure that limits are set on the child’s device and use software that can help minimise exposure to potentially malicious or inappropriate websites.

Whether you celebrity watch because you are enamoured, envious or inspired, please don’t let your hobby put you at risk of identity theft. Ensure you (and your kids) search safely so you can stay out of the way of cybercrims and their scams!

Alex x

 

The post Aussie Ruby Rose is McAfee’s Most Dangerous Celebrity appeared first on McAfee Blogs.

McAfee’s Most Dangerous Celebrities Study 2018: Ruby Rose Takes Center Stage

Every rose has its thorn, right? Apparently, the same goes for actress Ruby Rose, as her newfound popularity from “Orange is the New Black” has made her both famous, and maybe even dangerous. At least when it comes to online interactions. You heard correctly, the newly announced Batwoman has also been crowned McAfee’s Most Dangerous Celebrity this year. For the twelfth year in a row, McAfee researched famous individuals to reveal the riskiest celebrity to search for online, or, which search results could expose fans to malicious sites. Ruby Rose took home the top spot in 2018, but curious about who the runner-ups are? Here’s the full list:

Recent popular reality and sitcom shows have driven some stars (Kristin Cavallari, Debra Messing, Kourtney Kardashian) to the top of our list. Which is one of the few reasons this list is so different than last year’s. Unlike 2017’s list of Most Dangerous Celebrities, musicians ranked low on this year’s list. Adele was the highest ranked musician at No. 21 followed by Shakira (No. 27), 2017’s top celebrity Avril Lavigne (No. 30), and Lady Gaga (No. 35).

So, whether you’re looking up what Ruby did on the latest “Orange is the New Black” episode, or what Kristin Cavallari wore the latest awards show, make sure you’re searching the internet safely. To keep your internet activity secure and danger-free, follow these tips:

  • Be careful what you click. Users looking for a sneak-peek of the CW series, Batwoman starring Ruby Rose should be cautious and only download directly from a reliable source. The safest thing to do is to wait for the official release instead of visiting a third-party website that could contain malware.
  • Apply system and application updates as soon as they are available. Very often the operating system and application updates include security fixes. Applying updates is an important step to help ensure devices stay protected.
  • Browse with security protection. McAfee Total Protection is a comprehensive security solution that can help keep devices protected against malware, phishing attacks, and other threats. It includes McAfee WebAdvisor which can help protect against going to malicious websites.
  • Use parental control software. Kids are fans of celebrities too, so ensure that limits are set on the child’s device and use software that can help minimize exposure to potentially malicious or inappropriate websites.

And, of course, to stay on top of the latest consumer and mobile security threats, be sure to follow me and @McAfee_Home on Twitter, listen to our podcast Hackable? and ‘Like’ us on Facebook.

The post McAfee’s Most Dangerous Celebrities Study 2018: Ruby Rose Takes Center Stage appeared first on McAfee Blogs.

McAfee Blogs: McAfee’s Most Dangerous Celebrities Study 2018: Ruby Rose Takes Center Stage

Every rose has its thorn, right? Apparently, the same goes for actress Ruby Rose, as her newfound popularity from “Orange is the New Black” has made her both famous, and maybe even dangerous. At least when it comes to online interactions. You heard correctly, the newly announced Batwoman has also been crowned McAfee’s Most Dangerous Celebrity this year. For the twelfth year in a row, McAfee researched famous individuals to reveal the riskiest celebrity to search for online, or, which search results could expose fans to malicious sites. Ruby Rose took home the top spot in 2018, but curious about who the runner-ups are? Here’s the full list:

Recent popular reality and sitcom shows have driven some stars (Kristin Cavallari, Debra Messing, Kourtney Kardashian) to the top of our list. Which is one of the few reasons this list is so different than last year’s. Unlike 2017’s list of Most Dangerous Celebrities, musicians ranked low on this year’s list. Adele was the highest ranked musician at No. 21 followed by Shakira (No. 27), 2017’s top celebrity Avril Lavigne (No. 30), and Lady Gaga (No. 35).

So, whether you’re looking up what Ruby did on the latest “Orange is the New Black” episode, or what Kristin Cavallari wore the latest awards show, make sure you’re searching the internet safely. To keep your internet activity secure and danger-free, follow these tips:

  • Be careful what you click. Users looking for a sneak-peek of the CW series, Batwoman starring Ruby Rose should be cautious and only download directly from a reliable source. The safest thing to do is to wait for the official release instead of visiting a third-party website that could contain malware.
  • Apply system and application updates as soon as they are available. Very often the operating system and application updates include security fixes. Applying updates is an important step to help ensure devices stay protected.
  • Browse with security protection. McAfee Total Protection is a comprehensive security solution that can help keep devices protected against malware, phishing attacks, and other threats. It includes McAfee WebAdvisor which can help protect against going to malicious websites.
  • Use parental control software. Kids are fans of celebrities too, so ensure that limits are set on the child’s device and use software that can help minimize exposure to potentially malicious or inappropriate websites.

And, of course, to stay on top of the latest consumer and mobile security threats, be sure to follow me and @McAfee_Home on Twitter, listen to our podcast Hackable? and ‘Like’ us on Facebook.

The post McAfee’s Most Dangerous Celebrities Study 2018: Ruby Rose Takes Center Stage appeared first on McAfee Blogs.



McAfee Blogs

Cybersecurity Research Shows Risks Continue to Rise

Research is at the center of the cybersecurity industry, with a steady stream of reports that highlight weaknesses in cyber defenses and potential solutions. Last week was a particularly busy

The post Cybersecurity Research Shows Risks Continue to Rise appeared first on The Cyber Security Place.

Announcing McAfee’s Evolved Consumer Product Portfolio

Every fall the leaves change colors, sweaters replace sundresses, and new changes are afoot. Especially for us at McAfee. In fact, we’re announcing quite a few changes to our consumer security portfolio this fall. Tailored to the increasingly connected world we live in, our evolved line of products focuses on better performance, better ransomware protection, and a holistic approach to securing every facet of a connected consumer’s life. Curious how exactly our lineup does that? Allow us to break it down.

First, there are a few key product updates. In exciting news, McAfee Identity Theft Protection and McAfee Safe Family are now both included in McAfee Total Protection and McAfee LiveSafe. Additionally, McAfee Ransom Guard and PC Boost have been added to the entire product lineup, which includes McAfee AntiVirus, McAfee AntiVirus Plus and McAfee Internet Security. Now, let’s get into a few specifics about product performance.

Improved Performance

McAfee’s core lineup of products now sends malware analysis to the McAfee Global Threat Intelligence (GTI) cloud, which means fewer system resources are required, and PCs can work at optimal speeds. Beyond that, we’ve also implemented a few key PC enhancements, including:

  • McAfee App Boost – Helps resource-hungry apps complete tasks more quickly by automatically allocating more resources to applications the customer is actively using.
  • McAfee Web Boost – Prevents unwanted or unrequested downloads and system activity caused by auto-play videos resulting in reduced bandwidth and resource consumption.

There’s a few notable mobile enhancements as well, which include:

    • McAfee Mobile Security – Fully redesigned to deliver a more intuitive and engaging user experience.
    • McAfee Mobile Security for Android – Now includes machine learning capabilities within the mobile AV engine, which provides more efficient scanning and faster malware detection.
    • McAfee Mobile Security for iOS – New Wi-Fi Threat Scan shows the security status of the connected Wi-Fi network and alerts users if the Wi-Fi network they are connected to is at risk.

Increased Ransomware Protection

Ransomware attacks have shown no signs of slowing, which is why last year McAfee introduced a machine learning-based anti-virus engine with Real Protect to protect consumers from modern-day threats. And now we’ve updated our features to continue the fight against these advanced attacks. New features include:

  • McAfee Ransom Guard – Adds another layer of protection on the PC which monitors for suspicious file changes, warns the user when ransomware may be at work and suggests recommended actions for remediation. Additionally, this technology allows McAfee to detect many variants of zero-day ransomware.
  • Virus Protection Pledge – This year’s lineup extends the guarantee to six additional languages. If a customer enrolled in automatic renewal gets a virus with protection turned on, the customer support team will remove it, or the customer will receive a refund.

Protecting People’s Digital Lives

As people become more and more connected in the modern digital era, they’re in need of protection in every part of their online life. That’s why McAfee’s new lineup now includes features that make it easier than ever to protect what matters most. This includes:

  • McAfee Safe Family – Provides parents the visibility and controls needed to keep their children safer online when they use their PCs, smartphones and tablets.
    • Key features and benefits include: Activity reports, app and web blocking capabilities, screen time controls, location tracking, 1-click digital time-outs and more. McAfee Safe Family Premium is included with subscriptions to McAfee Total Protection 10 and McAfee LiveSafe.
  • McAfee Identity Theft Protection – Allows users to take a proactive approach to protecting their identities.
    • Key features and benefits include: Cyber monitoring, Social security number trace, credit monitoring, 24/7 agency support and ID recovery and stolen funds reimbursement. McAfee Identity Theft Protection Essentials is included with subscriptions to McAfee Total Protection 10 and McAfee LiveSafe.

So, whether you’re focused on fighting back against ransomware, or ensuring all your online interactions are protected from threats, our evolved portfolio of products is here to ensure you can live your connected life with confidence. Make sure you get proactive about your personal protection now.

To learn more about consumer security and our approach to it, be sure to follow us at @McAfee and @McAfee_Home.

The post Announcing McAfee’s Evolved Consumer Product Portfolio appeared first on McAfee Blogs.

McAfee Blogs: Announcing McAfee’s Evolved Consumer Product Portfolio

Every fall the leaves change colors, sweaters replace sundresses, and new changes are afoot. Especially for us at McAfee. In fact, we’re announcing quite a few changes to our consumer security portfolio this fall. Tailored to the increasingly connected world we live in, our evolved line of products focuses on better performance, better ransomware protection, and a holistic approach to securing every facet of a connected consumer’s life. Curious how exactly our lineup does that? Allow us to break it down.

First, there are a few key product updates. In exciting news, McAfee Identity Theft Protection and McAfee Safe Family are now both included in McAfee Total Protection and McAfee LiveSafe. Additionally, McAfee Ransom Guard and PC Boost have been added to the entire product lineup, which includes McAfee AntiVirus, McAfee AntiVirus Plus and McAfee Internet Security. Now, let’s get into a few specifics about product performance.

Improved Performance

McAfee’s core lineup of products now sends malware analysis to the McAfee Global Threat Intelligence (GTI) cloud, which means fewer system resources are required, and PCs can work at optimal speeds. Beyond that, we’ve also implemented a few key PC enhancements, including:

  • McAfee App Boost – Helps resource-hungry apps complete tasks more quickly by automatically allocating more resources to applications the customer is actively using.
  • McAfee Web Boost – Prevents unwanted or unrequested downloads and system activity caused by auto-play videos resulting in reduced bandwidth and resource consumption.

There’s a few notable mobile enhancements as well, which include:

    • McAfee Mobile Security – Fully redesigned to deliver a more intuitive and engaging user experience.
    • McAfee Mobile Security for Android – Now includes machine learning capabilities within the mobile AV engine, which provides more efficient scanning and faster malware detection.
    • McAfee Mobile Security for iOS – New Wi-Fi Threat Scan shows the security status of the connected Wi-Fi network and alerts users if the Wi-Fi network they are connected to is at risk.

Increased Ransomware Protection

Ransomware attacks have shown no signs of slowing, which is why last year McAfee introduced a machine learning-based anti-virus engine with Real Protect to protect consumers from modern-day threats. And now we’ve updated our features to continue the fight against these advanced attacks. New features include:

  • McAfee Ransom Guard – Adds another layer of protection on the PC which monitors for suspicious file changes, warns the user when ransomware may be at work and suggests recommended actions for remediation. Additionally, this technology allows McAfee to detect many variants of zero-day ransomware.
  • Virus Protection Pledge – This year’s lineup extends the guarantee to six additional languages. If a customer enrolled in automatic renewal gets a virus with protection turned on, the customer support team will remove it, or the customer will receive a refund.

Protecting People’s Digital Lives

As people become more and more connected in the modern digital era, they’re in need of protection in every part of their online life. That’s why McAfee’s new lineup now includes features that make it easier than ever to protect what matters most. This includes:

  • McAfee Safe Family – Provides parents the visibility and controls needed to keep their children safer online when they use their PCs, smartphones and tablets.
    • Key features and benefits include: Activity reports, app and web blocking capabilities, screen time controls, location tracking, 1-click digital time-outs and more. McAfee Safe Family Premium is included with subscriptions to McAfee Total Protection 10 and McAfee LiveSafe.
  • McAfee Identity Theft Protection – Allows users to take a proactive approach to protecting their identities.
    • Key features and benefits include: Cyber monitoring, Social security number trace, credit monitoring, 24/7 agency support and ID recovery and stolen funds reimbursement. McAfee Identity Theft Protection Essentials is included with subscriptions to McAfee Total Protection 10 and McAfee LiveSafe.

So, whether you’re focused on fighting back against ransomware, or ensuring all your online interactions are protected from threats, our evolved portfolio of products is here to ensure you can live your connected life with confidence. Make sure you get proactive about your personal protection now.

To learn more about consumer security and our approach to it, be sure to follow us at @McAfee and @McAfee_Home.

The post Announcing McAfee’s Evolved Consumer Product Portfolio appeared first on McAfee Blogs.



McAfee Blogs

Safari and Edge Browser Users: This Flaw May Help Hackers Hijack Your Internet Activity

A browser is our connection to the world wide web – it allows us to access websites, gain information, make online purchases, the list goes on. As the key to our internet usage, browsers can also be the key to unlocking our personal information. So, unfortunately, browser flaws can have a major impact on users. And now, this exact scenario has come to life, as news emerged this week about a flaw in both Safari and Microsoft’s Edge browser that could expose users to a cyberattack.

You know how when you type in a URL into your web browser, it can often take a few seconds to load? This flaw relies on exactly that. While a safe URL is loading, a cybercriminal could actually edit and update the address bar and redirect users to a potentially malicious website. Essentially, a hacker could send a user to an attack site of their choosing and make the user believe they’re still accessing a safe site.

Of course, the security researcher who discovered the vulnerability informed both Microsoft and Apple and waited 90 days until publishing his report about the flaw. As of now, Microsoft has issued a fix, but Apple has not.

So, what can internet users do next to ensure they don’t fall victim to a cyberattack that leverages this flaw? Start by following these tips

  • Don’t leave your computer unattended. It’s important to note that this vulnerability is completely dependent on physical access to a user’s computer. Now that this vulnerability has been disclosed, it’s important that you keep a close eye on your computer until you apply any necessary updates.
  • Update your software immediately. It’s an important security rule of thumb: always update your software whenever an update is available, as security patches are usually included with each new version. Microsoft’s patch is already available, and the Apple patch is hopefully on the way. If you tend to forget to update your browser, a simple trick is just turning on automatic update.
  • Remain alert of malicious sites. It can be challenging to successfully identify malicious sites when you’re on them, especially with a flaw such as this one out there. That’s why you should utilize a solution such as McAfee WebAdvisor, which keeps you safe from threats while you search and browse the web, without impacting your browsing performance or experience.

And, of course, to stay on top of the latest consumer and mobile security threats, be sure to follow me and @McAfee_Home on Twitter, listen to our podcast Hackable? and ‘Like’ us on Facebook.

The post Safari and Edge Browser Users: This Flaw May Help Hackers Hijack Your Internet Activity appeared first on McAfee Blogs.

Back to School: Cybersecurity in the Classroom

It’s hard to believe that summer is coming to an end and that back-to-school time is around the corner. For some kids, that means cyberbullies are traded in for school bullies and social engagement will turn into in-person interactions. But for others — dubbed Extreme Internet Users — the screen stays. When it comes time to go back to the classroom, the six hours or more a day these kids spent online during summer may be curtailed in favor of educational screen time instead.

Every year around this time, I reflect on how much has changed for children, especially when it comes to mobile devices in the classroom. This trend has become increasingly popular and, on the rise, as technology has improved, education adapts to rapid changes, and our world becomes more interconnected. Either these devices are given to kids or their classrooms by their school, or parents are encouraged to purchase one for their child to help support internet research and to digitize note-taking and homework.

Regardless of whether you’re a technophile or technophobe when it comes to leveraging screens in education, one thing is for sure – their presence in learning environments is here to stay. And with this shift, security is of the utmost importance.

Since January 2016, there have been 353 cybersecurity incidents in the United States related to K-12 public schools and districts. These attacks range include phishing, ransomware, DoS attacks and breaches that have exposed personal data. However, the question – what motivates cybercriminals to target schools? – still persists. The answer is complex, because what cybercriminals could exploit depends on what they want to accomplish.  Extorting school faculty, hacking private student data, disrupting school operations, or disabling, compromising, or re-directing school technology assets are all regular tools of the trade when it comes to hacking schools.

You may not be able to control how your child’s school thinks about cybersecurity, but you can take matters into your own hands. There are steps you can take to make sure your child is ready to face the school year head-on, including protecting their devices and their data.

  • Start a cybersecurity conversation. Talk with school faculty about what is being done in terms of a comprehensive cybersecurity plan for your child’s school. It’s worth starting the conversation to understand where the gaps are and what is being done to patch them.
  • Install security software on all devices. Don’t stop at the laptop, all devices need to be protected with comprehensive security software, including mobile devices and tablets.
  • Make sure all device software is up-to-date. This is one of the easiest and best ways to secure your devices against threats.
  • Teach your child how to connect securely on public Wi-Fi networks. Public Wi-Fi networks are notoriously used as backdoors by hackers trying to gain access to personal information. If Wi-Fi is absolutely necessary, ensure the network is password protected. However, if you want a secure encrypted connection, consider using a virtual private network (VPN).
  • Designate a specific date and time for regular data back-ups. If ransomware hits, you won’t have to pay to get your child’s information back. You can back up that personal data to a physical external hard drive or use an online backup service, such as Dropbox or Google Drive. That way you can access your files even if your device gets compromised.
  • Understand your child’s school bring your own device (BYOD) policy. Each school is different when it comes to BYOD and understanding your child’s school policy will save you a headache down the road. Some schools buy devices for students to rent, with parents having to pay for any incidentals, and some ask parents to buy the devices outright. Take the time to understand your child’s school policy before accidents happen.

Interested in learning more about IoT and mobile security tips and trends? Stop by ProtectWhatMatters.online, and follow @McAfee_Home on Twitter, and ‘Like” us on Facebook.

The post Back to School: Cybersecurity in the Classroom appeared first on McAfee Blogs.

Cryptojacking Campaign Caught Targeting Over 200,000 MikroTik Routers

Our routers are our connection to the internet, allowing us to use our devices to access websites at our leisure. And because of this, routers are often a target for hackers. In fact, just this week, it was uncovered that MikroTik is the latest router manufacturer under siege, as researchers have discovered a massive Coinhive cryptojacking campaign that’s targeting MikroTik routers.

The attack first finds its footing by taking advantage of a vulnerability within MikroTik routers. Once it leverages the flaw, the attack changes the devices’ configuration to inject Coinhive cryptocurrency mining malware into users’ web traffic. For context, Coinhive is a cryptocurrency mining service. Set up as a legitimate service, Coinhive is unfortunately often used by cybercriminals to hack websites and cryptojack users, aka steal the processing power of their devices to mine for cryptocurrency without their consent.

Which is precisely what’s happening to over 200,000 MikroTik customers, largely in Latin America. However, the attack has the potential to start spreading all over the world, given there are 1.7 million MikroTik routers all over.

Now, the next question is – what can these MikroTik users do to protect themselves from this attack? Start by following these proactive security tips:

  • Update your router’s firmware. MikroTik actually patched this vulnerability back in April, but that doesn’t necessarily mean that users applied the required patch. Therefore, this attack is a reminder of just how important it is to regularly update your router’s firmware, as these fixes are typically included within each update.
  • Check online notices. When made aware of vulnerabilities, manufacturers will notify the public, as well as make them aware of incoming fixes. Therefore, scan technical service bulletins or notices on a company site so that if a vulnerability does pop up with your router, you can learn what to do to help your device stay secure.
  • Secure your home’s internet at the source. Your home router allows your entire family to connect to the internet. If it’s vulnerable, your internet activity can be compromised as a result – just like with this MikroTik attack. So, be sure to use a router with built-in security like McAfee Secure Home Platform, which provides protection against threats at the router-level.

And, of course, to stay on top of the latest consumer and mobile security threats, be sure to follow me and @McAfee_Home on Twitter, listen to our podcast Hackable? and ‘Like’ us on Facebook.

The post Cryptojacking Campaign Caught Targeting Over 200,000 MikroTik Routers appeared first on McAfee Blogs.

5 Tips for Managing Your Digital Footprint and Online Reputation

Did you know that what you do online could determine your future? That’s because employers and universities often look at your “digital footprint” when deciding whether to give you an opportunity, or not.

Your digital footprint includes everything you say and do online, including casual “likes”, fun photos, and comments, as well as the information you intentionally post to promote yourself, such as online resumes and professional profiles. This is why you should take some time to manage your online reputation.

A recent study by CareerBuilder found that 70% of employers use search engines and social media to screen candidates. What’s more, 54% of employers surveyed said that they reconsidered candidates after getting a bad impression of them online.

This situation should be especially concerning for younger adults who are entering the job market for the first time, after years of carefree posting.

And if you think that once you have a job you can forget about looking after your digital footprint, think again. Employers also said that they check employees’ online presence when considering promotions.

Even colleges and universities rely on social media checks to get a better sense of applicants, according to a recent survey of admissions officers.

Of course, having a negative online presence is one problem, but having no presence at all is an even bigger red flag, so don’t start deleting profiles and accounts, or making everything “private”.

Over half of employers surveyed said that they are less likely to interview a candidate with no visible presence online. In this age, everyone is expected to have a digital footprint—it’s what that footprint says about you that matters the most.

So, how do you make sure that your digital footprint gives a good impression of you?

Here are some important tips:

  • Start Online Awareness Early—It’s easier to build a positive digital footprint from a young age, than to clean up a questionable presence later on. (When you consider that many kids get a smartphone at the age of 10, editing 8 years of online activity before college could be a real chore!) Talk to your kids about the importance of giving a positive impression online before they engage. When you do decide to let your kids connect, make sure to use parental controls that limit the kinds of content they can access, and protects them from online threats.
  • Be cautious about over-sharing—Yes, social media was made for sharing, but try to avoid venting online or engaging in heated arguments. If you have a problem with someone, talk it out offline.
  • Turn off tagging—Just because you’re paying attention to your online reputation, doesn’t mean your friends are. Being “tagged” in photos or videos you didn’t post could leave you open to the wrong impressions. That’s why it’s best to turn off tagging in your social media settings.
  • Keep positive content public—If you have a great online presence, sharing your accomplishments and skills, make sure to make the posts public. This goes for your social channels, as well as your professional profiles.
  • Be yourself, but speak clearly and respectfully—Show your unique personality and creativity, since people respond to genuineness But remember to be articulate in the process. Check posts for spelling or grammar errors before you hit “send”, and avoid offensive language. When commenting on other people’s posts, do it respectfully.

Looking for more mobile security tips and trends? Be sure to follow @McAfee Home on Twitter, and like us on Facebook.

The post 5 Tips for Managing Your Digital Footprint and Online Reputation appeared first on McAfee Blogs.

Major International Airport’s Security System Found for Sale on Dark Web RDP Shop

The closest many of us get to the dark web is watching hackers surf it in television shows or movies. However, it is a very real place that contains lots of stolen data. This data, along with compromised systems, devices, and more are often sold in underground marketplaces that exist on the dark web. One type of marketplace is called a remote desktop protocol (RDP) shop, which provides access to stolen systems for a small fee. Found in one of these RDP shops by McAfee’s ATR team: a major international airport’s security and building automation systems, which could be purchased for only $10 USD.

You might be wondering – what does “access” mean in this scenario? Just like Spotify and Apple Music sell access to artist’s songs, or a gym sells access to their exercise machines, the dark web can sell remote access to hacked machines through these RDP shops. Once access is purchased, crooks can obtain logins to a victim’s computer system and essentially have full control of it.

Now, the McAfee ATR team is not exactly sure how the cybercriminals got their hands on these systems. But they do know that once something like an airport security system is purchased, crooks can do serious damage. This access could allow cybercriminals to do essentially anything they want – create false alerts to the internal security team, send spam, steal data and credentials, mine for cryptocurrency, or even conduct a ransomware attack on the organization.

So, what happens if your information was potentially compromised in the sale of one of these systems on the dark web? To protect your personal data from larger cybercriminal schemes that originate from RDP shops, be sure to follow these tips: 

  • Be selective about what you share. The best way to control where your information goes is by reducing the sources you share it with. That means not providing your personal information to every app, network, or system that asks for it. Be strict and diligent, and only provide something with information when it’s crucial to the service or experience it provides.
  • Set up an alert. Compromised information could potentially include financial data. Therefore, it’s best to proactively place a fraud alert on your credit so that any new or recent requests undergo scrutiny. This also entitles you to extra copies of your credit report, so you can check for anything suspicious. If you find an account you did not open, report it to the police or Federal Trade Commission, as well as the creditor involved so you can close the fraudulent account.
  • Invest in an identity theft monitoring and recovery solution. If enough personal data becomes compromised by cybercriminals accessing stolen systems, users could be potentially faced with the possibility of identity theft. That’s precisely why they should leverage a solution tool such as McAfee Identity Theft Protection, which allows users to take a proactive approach to protecting their identities with personal and financial monitoring and recovery tools to help keep their identities personal and secured.

And, of course, to stay on top of the latest consumer and mobile security threats, be sure to follow me and @McAfee_Home on Twitter, listen to our podcast Hackable? and ‘Like’ us on Facebook.

The post Major International Airport’s Security System Found for Sale on Dark Web RDP Shop appeared first on McAfee Blogs.

Teens, Gaming and Risk

How Are Your Kids Navigating the Dangers?

It’s no secret that our generation of digital natives love their gaming. Whether it’s on their smartphones, laptops or their dedicated gaming consoles – it’s quite mind boggling just how much gaming they can squeeze into their day-to-day lives!

Well, new research by McAfee shows exactly how much time our Aussie kids are spending working on their latest gaming quest – up to a whopping 4 hours a day! And while we would love them to be directing this time to homework, my bigger concern is around the risks.

Gaming Is Not All Bad News

When managed properly, gaming can be a terrific activity that provides some genuine benefits for players. Research shows it can help manage anxiety and depression, reduce pain and even help improve the memory and resilience of players. It can also provide terrific opportunities for social interactions by breaking down the barriers of physical social groups. Sounds idyllic, doesn’t it!!

Parents Concerned About Risks With Gaming

Despite our offspring assuring us otherwise, the majority of us parents do realise that there are some potential dangers associated with gaming. Two-thirds of us (65%) believe our kids are at risk of online grooming. 68% of us are concerned about cyberbullying and 58% worry that our children will become the victim of a cybercriminal’s scam.

What Are Parents Doing To Manage Risks of Online Gaming?

As first generation digital parents, we have a tough gig. Many of us are furiously trying to get our own heads around the constantly changing digital world without any intel from previous generations. Meanwhile, we need to be educating our kids about the challenges and pitfalls of the online world. It’s a big task!

Many parents do an amazing job but unfortunately, not all of us are taking the necessary steps to protect our kids and teach them how to navigate the challenges. According to the research:

  • almost 1 in 5 parents (18%) never monitor what their children are doing online;
  • 32% of parents do not follow the age ratings of games; and
  • 86% of parents allow their children to play online games recommended for older children.

This is despite the fact that many of us worry that our children will be exposed to violence, sex, drugs and gambling according to the research.

How Can We Protect Our Kids While Playing Video Games

It’s clearly one of the most popular hobbies for Aussie tweens and teens, so our job as parents is to ensure our kids are gaming as safely as possible. Here is my advice on the steps you should take to protect your kids:

  • Start Conversations Early

If you start talking about ways to game safely early, it will make your job that much easier when your children get older. If your kids are young, start with simple rules like: “don’t open messages from people you don’t know” and “decline friend requests from strangers.” You want online safety to be part of normal behaviour.

  • Be Careful What You Click

Most children have been using digital activities for entertainment from an early age, desensitising them to the potentials risks of online behaviour. Cybercriminals can use the popularity of video games to entice gamers to click on potentially malicious links. Think about what you are clicking on and ensure that it’s from a reliable source.

  • Control How Long They Play

Set a good example by minimising your use of devices around the home. Why not invest in parental control software to set time limits on your child’s device usage? Not only will you be reducing their exposure to potentially malicious or inappropriate websites, but they will probably get more homework done!

  • Avoid Malicious Links

If your children are searching online for gaming tips or new games to download, a tool like McAfee WebAdvisor can help them avoid dangerous websites and links, and will warn them if they do accidentally click on something malicious.

  • Be Protected

No matter what anyone in the family is doing online, invest in a security product like McAfee Total Protection that can help keep connected devices safe from malware. Just like any PC application, be sure to keep security software updated.

Responsible Gaming Could Actually Prepare Your Child for Their Career

In my opinion, parenting is all about preparing your child for their adult life. And a big part of that is ensuring they are employable. So, before you crack down too harshly on your child’s gaming habits consider this. A recent report by McAfee, entitled Winning The Game, identified that gamers have a skills set that may help fill the current and future demand for cyber security experts. Whether it’s cracking systems, avoiding counter attacks or deciphering codes, these gaming skills were nominated by almost 1000 cyber security professionals as easily transferable to a security professional role.

So, let your kids keep playing but absolutely minimise the risks. Introduce time limits, ensure a game is suitable and teach your kids how to navigate the challenges. That way, if they end up with an illustrious career in cybersecurity, you can take all the credit!!

Take care,

Alex xx

The post Teens, Gaming and Risk appeared first on McAfee Blogs.

Don’t Play Games With Your Cybersecurity: #RT2Win a Respawn-Worthy Prize

In recent years, gaming has grown drastically in popularity – moving from a niche hobby to a mainstream activity for adults and children alike. So much so that the majority (84%) of parents allow their children to play 1-4 hours of video games every single day. Despite this wide-spread video game use, new research from McAfee reveals that the majority of parents (71%) also worry that their child is at risk of being exposed to inappropriate content while gaming – including content related to adult websites, gambling, drugs or violence.

Even more staggering, 62% of children play games where they directly interact with other players, significantly increasing their risk of being targeted with inappropriate content or asked to share sensitive information. With this increase in popularity, it’s imperative that parents understand the potential cybersecurity risks to their children while playing games, and know how to provide proper guidance to their children to help keep them safe online.

This information have you feeling PWND? Before you decide it’s game over, we’re treating you to a #RT2Win sweepstakes on the @McAfee_Home Twitter handle to help you respawn! Five [5] lucky winners of the sweepstakes drawing will receive a $100 Amazon gift card. The best part? Entering is a breeze! Follow the instructions below to enter and good luck!

#RT2Win Sweepstakes Official Rules

  • To enter, go to https://twitter.com/McAfee_Home, and find the #RT2Win sweepstakes tweet.
  • The sweepstakes tweet will be released on Wednesday, June 13, 2018 at 12:00pm PT. This tweet will include the hashtags: #ProtectWhatMatters, #RT2Win, AND #Sweepstakes.
  • Retweet the sweepstakes tweet released on the above date, from your own handle. The #ProtectWhatMatters, #RT2Win AND #Sweepstakes hashtags must be included to be entered.
  • Sweepstakes will end on Wednesday, June 27, 2018 at 11:59pm PT. All entries must be made before that date and time.
  • Winners will be notified on Friday, June 29, 2018 via Twitter direct message.
  • Limit one entry per person

How to Win:

Retweet one of our contest tweets on @McAfee_Home that include “#ProtectWhatMatters, #RT2Win AND #Sweepstakes” for a chance to win a $100 Amazon gift card. Five [5] total winners will be selected and announced on June 27, 2018. Winners will be notified by direct message on Twitter. For full Sweepstakes details, please see the Terms and Conditions, below.

McAfee Most Dangerous Games #RT2Win Sweepstakes Terms and Conditions 

How to enter: 

No purchase necessary. A purchase will not increase your chances of winning. McAfee Most Dangerous Games #RT2Win Sweepstakes will be conducted from June 13, 2018 through June 27, 2018. All entries for each day of the McAfee Most Dangerous Games #RT2Win Sweepstakes must be received during the time allotted for the McAfee Most Dangerous Games #RT2Win Sweepstakes. Pacific Daylight Time shall control the McAfee Most Dangerous Games #RT2Win Sweepstakes, duration is as follows:

  • Begins Wednesday, June 13­­ at 12:00pm PST
  • Ends: Wednesday, June 27, 2018 at 11:59pm PST
  • Five [5] winners will be announced: Friday, June 29, 2018

For the McAfee Most Dangerous Games #RT2Win Sweepstakes, participants must complete the following steps during the time allotted for the McAfee Most Dangerous Games Sweepstakes:

  1. Find the sweepstakes tweet of the day posted on @McAfee_Home which will include the hashtags: #ProtectWhatMatters, #RT2Win and #Sweepstakes
  2. Retweet the sweepstakes tweet of the day and make sure it includes the #ProtectWhatMatters, #RT2Win, and hashtags.
  3. Note: Tweets that do not contain the #ProtectWhatMatters, #RT2Win, and #Sweepstakes hashtags will not be considered for entry.
  4. Limit one entry per person.

Five [5] winners will be chosen for the McAfee Most Dangerous Games #RT2Win Sweepstakes tweet from the viable pool of entries that retweeted and included #ProtectWhatMatters, #RT2Win and #Sweepstakes. McAfee and the McAfee social team will choose winners from all the viable entries. The winners will be announced and privately messaged on Friday, June 29, 2018 on the @McAfee_Home Twitter handle. No other method of entry will be accepted besides Twitter. Only one entry per user is allowed, per Sweepstakes.   

Eligibility: 

McAfee Most Dangerous Games #RT2Win Sweepstakes is open to all legal residents of the 50 United States who are 18 years of age or older on the dates of the McAfee Most Dangerous Games #RT2Win Sweepstakes begins and live in a jurisdiction where this prize and McAfee Most Dangerous Games #RT2Win Sweepstakes not prohibited. Employees of Sponsor and its subsidiaries, affiliates, prize suppliers, and advertising and promotional agencies, their immediate families (spouses, parents, children, and siblings and their spouses), and individuals living in the same household as such employees are ineligible.

Winner Selection:

Winners will be selected at random from all eligible retweets received during the McAfee Most Dangerous Games #RT2Win Sweepstakes drawing entry period. Sponsor will select the names of five [5] potential winners of the prizes in a random drawing from among all eligible submissions at the address listed below. The odds of winning depend on the number of eligible entries received. By participating, entrants agree to be bound by the Official McAfee Most Dangerous Games #RT2Win Sweepstakes Rules and the decisions of the coordinators, which shall be final and binding in all respects.

Winner Notification: 

 Each winner will be notified via direct message (“DM”) on Twitter.com by June 29, 2018. Prize winners may be required to sign an Affidavit of Eligibility and Liability/Publicity Release (where permitted by law) to be returned within ten (10) days of written notification, or prize may be forfeited, and an alternate winner selected. If a prize notification is returned as unclaimed or undeliverable to a potential winner, if potential winner cannot be reached within twenty four (24) hours from the first DM notification attempt, or if potential winner fails to return requisite document within the specified time period, or if a potential winner is not in compliance with these Official Rules, then such person shall be disqualified and, at Sponsor’s sole discretion, an alternate winner may be selected for the prize at issue based on the winner selection process described above.

Prizes: 

The prize for the McAfee Most Dangerous Games #RT2Win Sweepstakes is a $100 Amazon gift card for each of five entrants. Entrants agree that Sponsor has the sole right to determine the winners of the McAfee Most Dangerous Games #RT2Win Sweepstakes and all matters or disputes arising from the McAfee Most Dangerous Games #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor. Sponsor will not replace any lost or stolen prizes. Sponsor is not responsible for delays in prize delivery beyond its control. All other expenses and items not specifically mentioned in these Official Rules are not included and are the prize winners’ sole responsibility.

General Conditions: 

Entrants agree that by entering they agree to be bound by these rules. All federal, state, and local taxes, fees, and surcharges on prize packages are the sole responsibility of the prizewinner. Sponsor is not responsible for incorrect or inaccurate entry information, whether caused by any of the equipment or programming associated with or utilized in the McAfee Most Dangerous Games #RT2Win Sweepstakes, or by any technical or human error, which may occur in the processing of the McAfee Most Dangerous Games #RT2Win Sweepstakes. entries. By entering, participants release and hold harmless Sponsor and its respective parents, subsidiaries, affiliates, directors, officers, employees, attorneys, agents, and representatives from any and all liability for any injuries, loss, claim, action, demand, or damage of any kind arising from or in connection with the McAfee Most Dangerous Games #RT2Win Sweepstakes, any prize won, any misuse or malfunction of any prize awarded, participation in any McAfee Most Dangerous Games #RT2Win Sweepstakes -related activity, or participation in the McAfee Most Dangerous Games #RT2Win Sweepstakes. Except for applicable manufacturer’s standard warranties, the prizes are awarded “AS IS” and WITHOUT WARRANTY OF ANY KIND, express or implied (including any implied warranty of merchantability or fitness for a particular purpose).

Limitations of Liability; Releases:

By entering the Sweepstakes, you release Sponsor and all Released Parties from any liability whatsoever, and waive any and all causes of action, related to any claims, costs, injuries, losses, or damages of any kind arising out of or in connection with the Sweepstakes or delivery, misdelivery, acceptance, possession, use of or inability to use any prize (including claims, costs, injuries, losses and damages related to rights of publicity or privacy, defamation or portrayal in a false light, whether intentional or unintentional), whether under a theory of contract, tort (including negligence), warranty or other theory.

To the fullest extent permitted by applicable law, in no event will the sponsor or the released parties be liable for any special, indirect, incidental, or consequential damages, including loss of use, loss of profits or loss of data, whether in an action in contract, tort (including, negligence) or otherwise, arising out of or in any way connected to your participation in the sweepstakes or use or inability to use any equipment provided for use in the sweepstakes or any prize, even if a released party has been advised of the possibility of such damages.

  1. To the fullest extent permitted by applicable law, in no event will the aggregate liability of the released parties (jointly) arising out of or relating to your participation in the sweepstakes or use of or inability to use any equipment provided for use in the sweepstakes or any prize exceed $10. The limitations set forth in this section will not exclude or limit liability for personal injury or property damage caused by products rented from the sponsor, or for the released parties’ gross negligence, intentional misconduct, or for fraud.
  2. Use of Winner’s Name, Likeness, etc.: Except where prohibited by law, entry into the Sweepstakes constitutes permission to use your name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation (including in a public-facing winner list).  As a condition of being awarded any prize, except where prohibited by law, winner may be required to execute a consent to the use of their name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation. By entering this Sweepstakes, you consent to being contacted by Sponsor for any purpose in connection with this Sweepstakes.

Prize Forfeiture:

If winner cannot be notified, does not respond to notification, does not meet eligibility requirements, or otherwise does not comply with these prize McAfee Most Dangerous Games #RT2Win Sweepstakes rules, then the winner will forfeit the prize and an alternate winner will be selected from remaining eligible entry forms for each McAfee Most Dangerous Games #RT2Win Sweepstakes.

Dispute Resolution:

Entrants agree that Sponsor has the sole right to determine the winners of the McAfee Most Dangerous Games #RT2Win Sweepstakes and all matters or disputes arising from the McAfee Most Dangerous Games #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor.

Governing Law & Disputes:

Each entrant agrees that any disputes, claims, and causes of action arising out of or connected with this sweepstakes or any prize awarded will be resolved individually, without resort to any form of class action and these rules will be construed in accordance with the laws, jurisdiction, and venue of Delaware.

Privacy Policy: 

Personal information obtained in connection with this prize McAfee Most Dangerous Games #RT2Win Sweepstakes will be handled in accordance policy set forth at http://www.mcafee.com/us/about/privacy.html.

  1. Winner List; Rules Request: For a copy of the winner list, send a stamped, self-addressed, business-size envelope for arrival after June 13,2018 before June 27, 2018 to the address listed below, Attn: #RT2Win at CES Sweepstakes.  To obtain a copy of these Official Rules, visit this link or send a stamped, self-addressed business-size envelope to the address listed in below, Attn: Sarah Grayson. VT residents may omit return postage.
  2. Intellectual Property Notice: McAfee and the McAfee logo are registered trademarks of McAfee, LLC. The Sweepstakes and all accompanying materials are copyright © 2018 by McAfee, LLC.  All rights reserved.
  3. Sponsor: McAfee, LLC, Corporate Headquarters 2821 Mission College Blvd. Santa Clara, CA 95054 USA

The post Don’t Play Games With Your Cybersecurity: #RT2Win a Respawn-Worthy Prize appeared first on McAfee Blogs.

Don’t Play Games With Your Cybersecurity: Our Findings on the Role of Security in the World of Gaming

Playing video games has become a popular pastime for children of all ages (even for some adults too), as the virtual challenges encourage these players to try their hand at beating the game again and again. In fact, recent McAfee research found that gaming helps prepare these kids for a potential career in cybersecurity. However, what many children and parents don’t realize is that these games can also pose a serious threat to their family’s online safety. To unpack what that threat looks like exactly, we conducted the McAfee which explores consumers’ attitudes towards the perceived risks that come with gaming. Let’s dive into the key findings.

Our survey discovered that 62% of children play games where they speak to other people while playing, and parents who responded to our survey are most worried that this unknown person may be a sexual predator (75% of parents), bully (61%), cybercriminal who could steal personal or financial info (60%), or a drug dealer (37%). Despite this worry, 44% of parents would still allow their child to play a game that they are technically too young for (i.e. they are younger than the recommended age determined by the rating).

What’s more – despite allowing their children up to four hours of gaming per day, 71% of parents at least somewhat agree that their child is at risk of being exposed to inappropriate content while gaming. 62% worry about cybercriminals disguising themselves as another player to steal sensitive information, 58% are concerned that their child could click on a link and download a virus, and 52% worry about cybercriminals hacking gaming accounts and accessing personal or financial information. And unfortunately, some of these concerns have become a reality, as we’ve recently seen cyberattacks involving both Minecraft and Nintendo Switch.

So, with parents worried about the security risks that come with online gaming – why aren’t they doing something to assuage their own concerns? Fortunately, we have a few pointers you can use to start securing your kid’s online safety today:

  • Browse with protection. A tool like McAfee WebAdvisor can help you avoid dangerous websites and links, and will warn you in the event that you do accidentally click on something malicious.
  • Use comprehensive security. No matter what you do online, it’s best to use a security product like McAfee Total Protection that can help keep your connected devices safe from malware. Just like any PC application, be sure to keep your security software updated with the latest software version.
  • Use parental control software. Parental control will help you set time limits on your child’s device usage and help minimize exposure to potentially malicious or inappropriate websites.

And, of course, to stay on top of the latest consumer and mobile security threats, be sure to follow me and @McAfee_Home on Twitter, listen to our podcast Hackable? and ‘Like’ us on Facebook.

Survey Methodology: McAfee commissioned OnePoll to conduct a survey of 5,000 parents of children ages 6 to 16 who play online or console games in Australia, Germany, Singapore, the U.S. and the U.K.

The post Don’t Play Games With Your Cybersecurity: Our Findings on the Role of Security in the World of Gaming appeared first on McAfee Blogs.

Internet Safety Month: 5 Tips to Keep You Secure

The internet is infinitely expansive, but that’s often easy to forget as we now have immediate access to it in the palm of our hands. We feel safe scouring the digital world from the comfort of our homes, offices, or local coffee shops, but there is real danger lurking behind those virtual walls. Cybercriminals using the internet to infiltrate the Internet of Things (IoT) and our mobile devices is no longer the stuff of science fiction movies. Hacks, phishing scams, malicious sites, and malware, just to name a few — this world of hyper-connectivity has left us exposed to far greater threats than we could have ever imagined. To combat these looming threats and highlight the importance of staying safe online, June was dubbed Internet Safety Month. Seeing as the internet gives us the opportunity to learn, explore, create, and socialize, we should be doing so safely and securely.

According to a recent Pew Research Center survey, 77% of American adults own a smartphone, up from 35% just six years ago. Whether we’re traveling, working, or just having fun, our mobile devices — tablet, smartphone, or laptop — are within reach at all times. Our gadgets make it easier to connect with the world, but they also store tons of sensitive information about our lives. Yes, we may use our devices to talk and text, but we also use applications on those devices to access banking information, share our location, and check emails. This wealth of personal information on an easily hackable device should galvanize us to ensure that data stays out of the hands of cybercriminals. From ransomware to phishing scams, the numerous threats that can infect our IoT and mobile devices through the internet are ever-evolving menaces.

With the rise of IoT, the probability of a debilitating attack increases. Just like everything else online, IoT devices are one part of a massively distributed network. The billions of extra entry points that IoT devices create make them a greater target for cybercriminals. In 2016, this fact was proven and executed by the Mirai botnet, a malware strain that remotely enslaved IoT objects for use in large-scale attacks designed to knock websites and entire networks offline. The authors of Mirai discovered previously unknown vulnerabilities in IoT devices that could be used to strengthen their botnet, which at its height infected 300,000 devices. While this is an extreme example, it is very much a reality that could happen again — only this time worse. These ever-present threats make it crucial to maintain proper cyber hygiene while using the internet.

Internet Safety Month emphasizes the importance of staying safe while surfing the web, not just in June but all 365 days of the year. With new threats appearing every day, the time to be proactive about your online safety is now. Don’t find yourself on the wrong side of the most recent internet threat, follow these tips to stay protected:

  • Secure your devices. Strong passwords or touch ID features are your first line of defense against cybercriminals stealing your sensitive information. With security measures in place, your data is protected in the case of your device being lost or stolen. And reset those default passwords — many of today’s exploits come from leveraging devices where the default settings were never changed.
  • Only use apps you trust. Information about you is collected through the apps you use. Think about who is getting that data and if you’re comfortable with how it could be used.
  • Be picky about what Wi-Fi you’re using. Hotspots and public Wi-Fi networks are often unsecured, meaning anyone can see what you’re doing on your device. Limit your activity and avoid logging into accounts that hold sensitive information. Consider using a virtual private network (VPN) or a personal/mobile hotspot.
  • Disable Wi-Fi and Bluetooth when not in use. Stores and other locations use this information to track your movements when you are in range. Both Bluetooth and Wi-Fi can also act as digital entrances into your phone. When it’s not absolutely necessary, consider turning it off.
  • Keep your devices and apps up-to-date. Having the most up-to-date software and applications is the best defense against threats. If an app is no longer in use, just delete it to ensure your devices clutter-free and no longer housing unsupported or outdated apps.

Interested in learning more about IoT and mobile security tips and trends? Stop by ProtectWhatMatters.online, and follow @McAfee_Home on Twitter, and ‘Like” us on Facebook.

The post Internet Safety Month: 5 Tips to Keep You Secure appeared first on McAfee Blogs.