Posts Tagged 'endpoint protection'

Paul Doucette, the senior technical security engineer at Berkshire Health Systems, thrives on challenge. “Our biggest security priority is protecting our sensitive business data,” he says. “What keeps me coming back to the office every day is the thrill of being able to detect new threats and correct them before they turn into problems.” Doucette […]

JS/Nemucod is the detection name given to a family of malicious JavaScript downloaders that have appeared in spam campaigns since last year. They usually arrive as an email attachment, embedded in a ZIP archive, and pretend to be an invoice, a delivery notice, a resume, anything that may seem harmless and can be used as a social engineering […]

You might have been getting out of bed when attackers started sending hundreds of thousands of fake invoices the morning of April 27. Between 5:45 am and 11 am Pacific time, the first phase of the operation was steamrolling along. The invoices sent with fake .rtf files attached were in no way legitimate. In McAfee […]

No one likes dealing with passwords, but the reality is we need some form of identification and authentication to protect our digital reputation and information as well as to facilitate customized online experiences. As we celebrate World Password Day 2016, it is time to make passwords both strong and easy to use. At some point, someone […]

When your network spans the globe, you’ve got big challenges. How do you maintain visibility into potential network threats and stay in compliance with local regulations all at the same time? That was the problem facing one of our customers, a software developer for the international online gaming industry. This company has an enviable game […]