It could happen to any of us. One minute your laptop is sitting on a coffeehouse table or going through airport security, the next it’s gone. Your personal files are all locked behind a strong password, but is that enough to keep off prying eyes? In episode 19 of “Hackable?”, Geoff ships his laptop 1,000 ...
Read Blog
The Americas Partner Summit 2018 was held on Tuesday, October 16 at MPOWER Cybersecurity Summit. It was a day filled with McAfee and partner leadership coming together to collaborate on McAfee’s partner strategy, product portfolio, programs, and more. Here are some of the highlights: The Audience 338 partners 225 VAR, Disti, MSP, etc. 35 OEM ...
Read Blog
If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers would vary widely. Each team views the definition based on their own requirements, but the one answer that most likely won’t appear is: “To protect data.” Traditionally, database security has always been seen as a ...
Read Blog
The authors thank their colleagues Oliver Devane and Deepak Setty for their help with this analysis. McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies. Coin mining malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background ...
Read Blog
Ahmad, Software Architect Hailing from a small town in India, school for me was largely a means to an end. Rather than a chance to explore and cultivate my own interest, education was a path to a degree that could be used to obtain a steady and respectable career. Throughout my childhood, however, I was ...
Read Blog
By: Hannah, Software Quality Assurance Engineer I joined the McAfee Quality Assurance team at the Brighton office earlier this year. It was immediately obvious that the company is determined to encourage more women into technology roles. At McAfee, I have a voice, I’m heard, and my skills, experience and capabilities are valued and taken seriously. ...
Read Blog
From gaming to helping people conquer their fear of spiders and getting quarterbacks ready for Sunday, virtual reality is a much-hyped emerging technology. But is it hackable?   In Ep. 18 of of Hackable?, “Virtually Vulnerable”, Geoff straps on a headset and tests his mettle against white-hat hackers manipulating his virtual experience. Can he withstand ransomware, a human ...
Read Blog
From gaming to helping people conquer their fear of spiders and getting quarterbacks ready for Sunday, virtual reality is a much-hyped emerging technology. But is it hackable?   In Ep. 18 of of Hackable?, “Virtually Vulnerable”, Geoff straps on a headset and tests his mettle against white-hat hackers manipulating his virtual experience. Can he withstand ransomware, a human ...
Read Blog
Here at McAfee, everything we do is driven by our desire to make the digital world more secure. The proliferation of internet-connected technology has made cybercrime the greatest challenge of the digital age. But we can’t fight it alone. That’s why as Chief Consumer Security Evangelist, one of my biggest concerns is raising cybersecurity awareness. ...
Read Blog