While Amazon hasn’t begun using autonomous drones to deliver packages (yet), the aerial technology is becoming more and more popular. Hobbyists, racers, photographers, and even police departments have registered more than 1 million drones with the FAA. But is the emerging technology secure?  In the latest episode of “Hackable?”, host Geoff Siskind travels to Johns ...
Read Blog
Destructive malware has been employed by adversaries for years. Usually such attacks are carefully targeted and can be motivated by ideology, politics, or even financial aims. Destructive attacks have a critical impact on businesses, causing the loss of data or crippling business operations. When a company is impacted, the damage can be significant. Restoration can ...
Read Blog
By Kristol, Sales Account Manager and President, McAfee African Heritage Community If you talked to me when I first started working at McAfee, I wouldn’t have believed you if you told me that I’d still be working here 16 years later. But I am still working here, and I’ve grown from every challenge and success ...
Read Blog
This post was written with contributions from the McAfee Advanced Threat Research team.   The McAfee Advanced Threat Research team and McAfee Labs Malware Operations Group have discovered a new global campaign targeting nuclear, defense, energy, and financial companies, based on McAfee® Global Threat Intelligence. This campaign, Operation Sharpshooter, leverages an in-memory implant to download ...
Read Blog
We all share photos online: photos of our kids, photos of our trips, and photos of our meals. We think we are sharing memorable experiences with our friends and family, but are we sharing more with the public than we intend? What if hidden metadata could reveal dangerous details? In episode 20 of “Hackable?”, a ...
Read Blog
We all share photos online: photos of our kids, photos of our trips, and photos of our meals. We think we are sharing memorable experiences with our friends and family, but are we sharing more with the public than we intend? What if hidden metadata could reveal dangerous details? In episode 20 of “Hackable?”, a ...
Read Blog
For the past 18 months, McAfee Labs has been investigating a pay-per-install developer, WakeNet AB, responsible for spreading prevalent adware such as Adware-Wajam and Linkury. This developer has been active for almost 20 years and recently has used increasingly deceptive techniques to convince users to execute its installers. Our report is now available online. During ...
Read Blog
Cybersecurity is playing an increasingly greater role in our government and economy. As our world becomes more interconnected, the cyberthreat landscape is growing and rapidly evolving. To address both physical threats and cyberthreats, the leading federal agency must have the flexibility and resources to quickly mitigate any potential interruptions or harm. Last week, a critical ...
Read Blog
These predictions were written by Eoin Carroll, Taylor Dunton, John Fokker, German Lancioni, Lee Munson, Yukihiro Okutomi, Thomas Roccia, Raj Samani, Sekhar Sarukkai, Dan Sommer, and Carl Woodward. As 2018 draws to a close, we should perhaps be grateful that the year has not been entirely dominated by ransomware, although the rise of the GandCrab ...
Read Blog