The summer months usher in longer days, more sunshine, and sometimes a decline in creativity – often causing a lack of creative energy. For those of us who find ourselves working through the summer months...
McAfee product coverage and mitigations for malware or indicators associated with the recent attacks (a.k.a. Dragonfly, Energetic Bear, Havex/SYSMain) on industrial control systems (ICS's) are listed below.
Endpoint Security, Part 1 of 5: The Risk of Going Unprotected
Making a business case for investments in information security has never been easy. We make these types of investments to protect against...
In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else. Everyone else is fairly harmless. They enjoy their smartphones as they are, and, for the most part, lead fairly secure mobile lives. The same, however, cannot be said for jailbreakers—especially after one of the largest jailbreaking repositories for […]
Hey guys! I’m Bradi, and this is The Scan – bringing you the very latest in security news! Sharing is Caring The Senate Intelligence Committee just approved the Cybersecurity Information Sharing Act, which would make it easier for the government and private sector to share security threat information with each other. Of course, privacy groups […]
If late-70s rock star Eddie Money is to be believed, he is currently in possession of two tickets to paradise. Presumably, paradise makes for a nice vacation. Lucky him. The same, however, cannot be said of Vadim Polykov, 30, an accused Russian hacker who—coincidently—was arrested while vacationing in Spain. His crime? Buying tickets. Lots of […]
The security world, as many specialty fields, is full of acronyms. Those of us in the business know a SIEM from an IPS from a NGFW, and we’re happy to explain the difference to customers, many of whom know exactly what we’re talking about. There’s one set of acronyms, though, that can be confusing: APTs […]
This week we’re heading to Colorado for the Aspen Institute’s annual Aspen Security Forum. I’ll be speaking on a Friday panel entitled “WMD: The Nightmare Scenario,” discussing the application of cyber-attacks against critical infrastructure such as water systems, power plants, the electric grid, and industrial systems such as chemical plants. Cyberspace is now widely acknowledged […]