First Target and Neiman Marcus, now Sally Beauty. This seems an appropriate time to address not only how to recover from a security breach – but more importantly how to prevent future attacks and regain...
Things have kicked off with a force at Mobile World Congress 2014 in beautiful Barcelona, Spain, where several industries focusing on mobile technologies will come together to share the latest digital and social innovations.
Some would say that if encryption isn’t becoming ubiquitous, then it should be! Data breaches are in the news nearly every day now. Last week it was reported that in 2013, payment card data breaches...
The buzz about Bitcoin has moved from online circles to mainstream media sources. Last week’s news of the collapse of exchange Mt. Gox got more play than in just the business section. Everyone seems to be interested in the digital, anonymous, and stateless currency. Governments have made pronouncements, law enforcement has investigated its use in […]
Starting with the McAfee Labs Threats Report: Fourth Quarter 2013 posted today, we’re taking a fresh approach to its format, content, and supporting materials. We had several things in mind when developing this new approach: Focusing on a few key topics and trends. Those topics will cover top threats or security issues from the quarter; […]
A group of scammers seem to have taken to heart the lesson bequeathed to us by Three Dog Night in the summer of ’69: that yes, one is the loneliest number. This newly unleashed attack uses not one but multiple tactics to dupe unsuspecting victims by pairing a phishing attack—where hackers pose as trusted entities […]
From McAfee’s first Cyber Defense Center (CDC) in Dubai, we closely monitor threats and activities in Europe and the Middle East. Since the Center’s official launch in September 2013, we have seen quite a few interesting trends, especially in the Persian Gulf region. Many of the activities spotted are related to hacktivism, cybercrime, or regional […]
Target. Neiman Marcus. These are just two of the very latest victims of today’s increasingly stealthy threats permeating our cyber world. My post last month entitled, Stolen Data: Network Security Can Ensure You’re Not a Target, described the attacks that attempted to exfiltrate data from 110 million American consumers. Advanced persistent threats (APTs) were responsible […]