Tag: Annual Threats Predictions

These predictions were written by Eoin Carroll, Taylor Dunton, John Fokker, German Lancioni, Lee Munson, Yukihiro Okutomi, Thomas Roccia, Raj Samani, Sekhar Sarukkai, Dan Sommer, and Carl Woodward. As 2018 draws to a close, we should perhaps be grateful that the year has not been entirely dominated by ransomware, although the rise of the GandCrab ...
Read Blog
Time flies when you’re fighting cybercrime. Now that’s not exactly how the phrase goes, but for us at McAfee, it’s hard to believe that we’re already almost halfway through 2018. It seems like just yesterday we were predicting the types of cyberthreats we would see throughout this year with our McAfee Labs 2018 Threats Predictions ...
Read Blog
Amenazas, Normatividades y Respuestas de Proveedores a los Riesgos en la Internet de las Cosas El Salvaje Oeste, un lugar de exagerada anarquía en los Estados Unidos durante los 1800s, ha regresado una vez más como una metáfora para el Internet de las Cosas (IoT). Impulsados por problemas similares de exploración, propiedades ocupadas, y prospección ...
Read Blog
2016 has been quite the year. From widespread IoT attacks, to ransomware campaigns that extract millions of dollars, cyberthreats have continued to grow in size and impact throughout the past 12 months. And unfortunately, it looks like there’s no sign of slowing. With McAfee Labs releasing their 2017 Threats Predictions Report, we got to take ...
Read Blog
Improving the Lifecycle of Threat Defense Effectiveness When a new security tool or technique is released, Version 1.0 is usually pretty effective, and successive versions get even better with real-world scenarios and user feedback. Eventually, the bad guys realize that this new thing is causing them real problems, so they start looking for ways over, ...
Read Blog
Threats, Regulations, and Vendor Responses to Risks in the Cloud As more companies get comfortable with cloud services, trust and usage will go up, and that will inevitably attract the attention of cybercriminals. Although an increasing array of sensitive and confidential data is moving to cloud storage and processing, we expect that most businesses will ...
Read Blog
Threats, Regulations, and Vendor Responses to Risks in the Internet of Things The Wild West, a place of exaggerated lawlessness in the United States during the 1800s, has returned once again as a metaphor for the Internet of Things (IoT). Driven by similar issues of exploration, homesteading, and prospecting for riches, IoT devices are becoming ...
Read Blog
Cybersecurity changes rapidly. Those with valuable insights can better prepare for the shifting risks and opportunities. McAfee has just released the McAfee Labs 2016 Threats Predictions, a report covering both cybersecurity predictions for the coming year as well as a five-year look forward at the changing security field. Collectively, the report paints a picture of a growing technology ...
Read Blog