Security, By the Numbers, Is Big
When you quantify security, the numbers are big and plentiful. The reality of data being compromised is staggering, but we...
The post Security, By the Numbers, Is Big appeared first on McAfee Blog.
When you quantify security, the numbers are big and plentiful. The reality of data being compromised is staggering, but we...
The post Security, By the Numbers, Is Big appeared first on McAfee Blog.
This week in cybersecurity was yet another for the books, as we watched a tech giant swiftly avert a security...
The post XcodeGhost Pulled from App Store After a Good Scare: What to Know appeared first on McAfee Blog.
Last Tuesday, Google introduced Your Timeline for its Google Map website and Android devices. Your Timeline acts as a documentarian...
The post Forgot Where You Were Yesterday? Google Has You Covered. appeared first on McAfee Blog.
This blog post was written by Bruce Snell. Next month I’ll be moving back to the US after a few...
The post Remote Jeep Hacking Successful: Time to Patch Your Car? appeared first on McAfee Blog.
Frequent flyers, beware. Tens of thousands of accounts may have been compromised due to an automated attack against British Airways,...
The post British Airways Frequent Flyers Report Stolen Air Miles appeared first on McAfee Blog.
The best way to protect yourself from the malicious programs (often called malware) hidden across the Internet, is to have...
The post Google Brings Safe Browsing to the Masses With Its Safe Browsing API appeared first on McAfee Blog.
Microsoft Office scripting malware has become more and more common and aggressive lately as malware authors constantly develop new techniques...
The post ‘Banking’ Malware Dridex Arrives via Phishing Email appeared first on McAfee Blog.
Microsoft is on a roll with its cloud strategy. In the past two quarters, the software giant has posted triple-digit...
The post Office 365 Ascent Is Security Opportunity appeared first on McAfee Blog.
From the Heartbleed bug to large-scale (and highly publicized) data breaches, Shellshock to mobile threats—2014 did not leave us wanting...
The post 2014: Security Year in Review appeared first on McAfee Blog.
So far, 2014 has been a tumultuous year for the security industry. We’ve seen thousands of computers taken hostage through...
The post Mobile Malware, Phishing and Ransomware — Oh My! A Quick Look at the Current Threat Landscape appeared first on McAfee Blog.
On Tuesday afternoon, The New York Times revealed that a group of Russian hackers now holds 1.2 billion username and...
The post Russian Hackers Steal 1.2 Billion Passwords appeared first on McAfee Blog.
Recently, the McAfee Advanced Exploit Detection System (AEDS) has delivered some interesting RTF files to our table. These RTFs have...
The post Dropping Files Into Temp Folder Raises Security Concerns appeared first on McAfee Blog.
Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need to do to...
The post The Surprisingly Simple Google Maps Attack That Shut Down a Business appeared first on McAfee Blog.