Verizon Report Foreshadows Breaches Originating With IoT Devices
Today, Verizon released its 2015 Data Breach Investigations Report (DBIR). As Verizon noted in the Appendix D discussion of the security of the Internet of Things (with significant contributions from...
View ArticleVerizon Report Foreshadows Breaches Originating With IoT Devices, Part 2
On April 14, Verizon released its 2015 Data Breach Investigations Report (DBIR). Also that day, McAfee Labs posted a blog expanding on the DBIR’s Appendix D discussion of the security of the Internet...
View ArticleVerizon Report Foreshadows Breaches Originating With IoT Devices, Part 3
This post was written with the invaluable assistance of Steve Watson of Intel. On April 14, Verizon released its 2015 Data Breach Investigations Report (DBIR). Also that day, McAfee Labs posted a blog...
View ArticleVerizon Report Foreshadows Breaches Originating With IoT Devices, Part 4
This post was written with the invaluable assistance of Steve Watson of Intel. On April 14, Verizon released its 2015 Data Breach Investigations Report (DBIR). Since then, McAfee Labs posted three...
View ArticleMcAfee Labs Threats Report Highlights Surge in Ransomware, Flash Exploits,...
Intel Security today released the McAfee Labs Threats Report: May 2015. Along with the usual compilation of threats statistics, it focuses on three key topics: A surge in powerful and clever ransomware...
View ArticleComprehensive Malware Protection: It’s a Beautiful Thing!
As a general rule, technology companies do a very good job at product marketing–figuring out how the product they want to sell will solve a very specific customer problem. But seldom do they take a...
View ArticleJoin @McAfeeBusiness for #SecChat 3/21: Tomorrow’s Malware Threats
Predicting what malware will look like five years from now requires more than a crystal ball. In order to fully understand future threats and challenges, you need a finger on the broader pulse of...
View ArticleMarch #SecChat Recap: Future of Malware Threats
http://storify.com/McAfeeBusiness/secchat-recap-tomorrow-s-malware-threats The post March #SecChat Recap: Future of Malware Threats appeared first on McAfee.
View ArticleBeat Malware Through Integration
At RSA Conference in late February, McAfee announced the acquisition of sophisticated sandboxing technology and 38 product enhancements that together extend McAfee’s lead in protection against malware....
View ArticleEnd-to-end Protection Thwarts Malware
Recently, I wrote about the meaning of integration as it relates to protection against malware, why an integrated solution is important, and what is needed to deliver an integrated solution. Today, I’m...
View ArticleThe Economic Impact of Cybercrime and Cyber Espionage
Many estimates of the cost of cybercrime have been quoted publicly – ranging from a few billion to a trillion U.S. dollars globally on an annual basis – but most of these estimates are based on limited...
View ArticleBlack Hat 2013 Recap: Advanced Malware Discussions
It’s been a great week at Black Hat USA 2013. There’s been a lot of buzz around the McAfee booth and our team had lively discussions on the topic of advanced malware. Cybercrime is clearly getting more...
View ArticleCombating Advanced Malware: McAfee Survey at Black Hat USA 2013
The final survey results are in from Black Hat USA 2013 and it’s clear: IT professionals are frustrated that so much time is spent combating advanced malware. Many professionals devote half their...
View ArticleWelcome to the New McAfee Labs Quarterly Threats Report
Starting with the McAfee Labs Threats Report: Fourth Quarter 2013 posted today, we’re taking a fresh approach to its format, content, and supporting materials. We had several things in mind when...
View ArticleChecking the Pulse of McAfee Labs Threats Reports
In March, we wrote about changes that we were making to the McAfee Labs Threats Reports. Those changes included both format and content improvements. We wanted to make the Threats Reports more...
View ArticleMcAfee Labs Threats Report Takes Another Step Forward
In September, we invited readers of the McAfee Labs Threats Report to complete a short survey and let us know what they think about the report. Here’s what we learned. Readers are most interested in...
View ArticleNew Year, New Cyberthreats: What’s in Store for 2015? January #SecChat
Unfortunately, the good guys aren’t the only ones with resolutions for the New Year. From cyber espionage to increasingly unforgiving ransomware, non-Windows malware to attacks on the Internet of...
View ArticleImprove Protection Against Cyberattacks Through Shared Threat Intelligence
At the RSA Conference 2016 in San Francisco, Chris Young, GM and SVP of Intel Security, said that one of the best ways to improve response time to attacks and overall awareness of attacks and...
View Article‘McAfee Labs Threats Report’ Delves Into Dangers of Data Loss
Data is leaking out of your organization: accidentally or intentionally, by internals or externals, physically or electronically. During the past year, we have performed extensive research to identify...
View Article‘Aha’ Moments From the ‘Verizon 2017 Data Breach Investigations Report’
The annual Verizon Data Breach Investigations Report (DBIR) was published today. Once again, it is a hefty report that is sure to become one of the most referenced data breach reports in the world....
View ArticleMirai, BrickerBot, Hajime Attack a Common IoT Weakness
We know that devices in the Internet of Things make enticing targets for attack. They are often insecure and can act as open windows into trusted networks. Cybercriminals are capitalizing on that more...
View Article
More Pages to Explore .....