The summer months usher in longer days, more sunshine, and sometimes a decline in creativity – often causing a lack of creative energy. For those of us who find ourselves working through the summer months...
McAfee product coverage and mitigations for malware or indicators associated with the recent attacks (a.k.a. Dragonfly, Energetic Bear, Havex/SYSMain) on industrial control systems (ICS's) are listed below.
Endpoint Security, Part 1 of 5: The Risk of Going Unprotected
Making a business case for investments in information security has never been easy. We make these types of investments to protect against...
Stay connected to the latest security news and catch up with the industry’s major players. Our experts cover a broad spectrum of useful security information including in-depth analysis, interviews, and best practices.
The security world, as many specialty fields, is full of acronyms. Those of us in the business know a SIEM from an IPS from a NGFW, and we’re happy to explain the difference to customers, many of whom know exactly what we’re talking about. There’s one set of acronyms, though, that can be confusing: APTs […]
When I turned 25, I saw this as a pretty big milestone in my life. At 25 years old, I felt like a true adult – I was now all grown up. I was educated, employed, experienced and stable. But when I look back, the journey from childhood to adulthood was really far from over […]
“Shadow IT” is stepping out into the light of day. Business users are eagerly embracing the cloud and especially Software-as-a-Service (SaaS) in search of cost-effective productivity tools for file sharing and storage, collaboration, social media, and anything else that makes them more effective on the job. But the problem is these well-intentioned, hardworking employees are […]
To say cyber threats are getting more advanced may be the understatement of the year. Every minute, our 500-plus team at McAfee Labs learns something new about the behavior of malware and other types of network attacks. The most commonly undetected threat these days is the advanced evasion technique (AET). In the most basic terms, […]
Targeted attacks can take on many different forms and are flexible enough to adopt a variety of tactics. Think of them as a specialized unit for cyber criminals. They are utilized for very specific missions and operate with the precision of a surgical strike, rather than the carpet-bombing techniques used in other attack strategies. Whether […]