Quantcast
Channel: Rick Simon – McAfee Blogs
Browsing latest articles
Browse All 33 View Live

Verizon Report Foreshadows Breaches Originating With IoT Devices

Today, Verizon released its 2015 Data Breach Investigations Report (DBIR). As Verizon noted in the Appendix D discussion of the security of the Internet of Things (with significant contributions from...

View Article



Verizon Report Foreshadows Breaches Originating With IoT Devices, Part 2

On April 14, Verizon released its 2015 Data Breach Investigations Report (DBIR). Also that day, McAfee Labs posted a blog expanding on the DBIR’s Appendix D discussion of the security of the Internet...

View Article

Verizon Report Foreshadows Breaches Originating With IoT Devices, Part 3

This post was written with the invaluable assistance of Steve Watson of Intel. On April 14, Verizon released its 2015 Data Breach Investigations Report (DBIR). Also that day, McAfee Labs posted a blog...

View Article

Image may be NSFW.
Clik here to view.

Verizon Report Foreshadows Breaches Originating With IoT Devices, Part 4

This post was written with the invaluable assistance of Steve Watson of Intel. On April 14, Verizon released its 2015 Data Breach Investigations Report (DBIR). Since then, McAfee Labs posted three...

View Article

Image may be NSFW.
Clik here to view.

McAfee Labs Threats Report Highlights Surge in Ransomware, Flash Exploits,...

Intel Security today released the McAfee Labs Threats Report: May 2015. Along with the usual compilation of threats statistics, it focuses on three key topics: A surge in powerful and clever ransomware...

View Article


Comprehensive Malware Protection: It’s a Beautiful Thing!

As a general rule, technology companies do a very good job at product marketing–figuring out how the product they want to sell will solve a very specific customer problem. But seldom do they take a...

View Article

Join @McAfeeBusiness for #SecChat 3/21: Tomorrow’s Malware Threats

Predicting what malware will look like five years from now requires more than a crystal ball. In order to fully understand future threats and challenges, you need a finger on the broader pulse of...

View Article

March #SecChat Recap: Future of Malware Threats

http://storify.com/McAfeeBusiness/secchat-recap-tomorrow-s-malware-threats The post March #SecChat Recap: Future of Malware Threats appeared first on McAfee.

View Article


Beat Malware Through Integration

At RSA Conference in late February, McAfee announced the acquisition of sophisticated sandboxing technology and 38 product enhancements that together extend McAfee’s lead in protection against malware....

View Article


End-to-end Protection Thwarts Malware

Recently, I wrote about the meaning of integration as it relates to protection against malware, why an integrated solution is important, and what is needed to deliver an integrated solution. Today, I’m...

View Article

Image may be NSFW.
Clik here to view.

The Economic Impact of Cybercrime and Cyber Espionage

Many estimates of the cost of cybercrime have been quoted publicly – ranging from a few billion to a trillion U.S. dollars globally on an annual basis – but most of these estimates are based on limited...

View Article

Black Hat 2013 Recap: Advanced Malware Discussions

It’s been a great week at Black Hat USA 2013. There’s been a lot of buzz around the McAfee booth and our team had lively discussions on the topic of advanced malware. Cybercrime is clearly getting more...

View Article

Image may be NSFW.
Clik here to view.

Combating Advanced Malware: McAfee Survey at Black Hat USA 2013

The final survey results are in from Black Hat USA 2013 and it’s clear: IT professionals are frustrated that so much time is spent combating advanced malware. Many professionals devote half their...

View Article


Image may be NSFW.
Clik here to view.

Welcome to the New McAfee Labs Quarterly Threats Report

Starting with the McAfee Labs Threats Report: Fourth Quarter 2013 posted today, we’re taking a fresh approach to its format, content, and supporting materials. We had several things in mind when...

View Article

Image may be NSFW.
Clik here to view.

Checking the Pulse of McAfee Labs Threats Reports

In March, we wrote about changes that we were making to the McAfee Labs Threats Reports. Those changes included both format and content improvements. We wanted to make the Threats Reports more...

View Article


Image may be NSFW.
Clik here to view.

McAfee Labs Threats Report Takes Another Step Forward

In September, we invited readers of the McAfee Labs Threats Report to complete a short survey and let us know what they think about the report. Here’s what we learned. Readers are most interested in...

View Article

New Year, New Cyberthreats: What’s in Store for 2015? January #SecChat

Unfortunately, the good guys aren’t the only ones with resolutions for the New Year. From cyber espionage to increasingly unforgiving ransomware, non-Windows malware to attacks on the Internet of...

View Article


Image may be NSFW.
Clik here to view.

Improve Protection Against Cyberattacks Through Shared Threat Intelligence

At the RSA Conference 2016 in San Francisco, Chris Young, GM and SVP of Intel Security, said that one of the best ways to improve response time to attacks and overall awareness of attacks and...

View Article

Image may be NSFW.
Clik here to view.

‘McAfee Labs Threats Report’ Delves Into Dangers of Data Loss

Data is leaking out of your organization: accidentally or intentionally, by internals or externals, physically or electronically. During the past year, we have performed extensive research to identify...

View Article

Image may be NSFW.
Clik here to view.

‘Aha’ Moments From the ‘Verizon 2017 Data Breach Investigations Report’

The annual Verizon Data Breach Investigations Report (DBIR) was published today. Once again, it is a hefty report that is sure to become one of the most referenced data breach reports in the world....

View Article

Image may be NSFW.
Clik here to view.

Mirai, BrickerBot, Hajime Attack a Common IoT Weakness

We know that devices in the Internet of Things make enticing targets for attack. They are often insecure and can act as open windows into trusted networks. Cybercriminals are capitalizing on that more...

View Article

Browsing latest articles
Browse All 33 View Live




Latest Images