Cisco Issues 31 Mid-April Security Alerts

Among them, two are critical and six are of high importance. A busy month for Cisco router owners got busier yesterday when the networking giant introduced 31 new advisories and alerts. These announcements came on top of 11 high- and medium-impact vulnerabilities announced earlier in the month. Of the 31 alerts, 23 are of medium […]

Read more
IoT Zero-Days – Is Belkin WeMo Smart Plug the Next Malware Target?

Effective malware is typically developed with intention, targeting specific victims using either known or unknown vulnerabilities to achieve its primary functions. In this blog, we will explore a vulnerability submitted by McAfee Advanced Threat Research (ATR) and investigate a piece of malware that recently incorporated similar vulnerabilities. The takeaway from this blog is the increasing […]

Read more
Wipro Intruders Targeted Other Major IT Firms

The crooks responsible for launching phishing campaigns that netted dozens of employees and more than 100 computer systems last month at Wipro, India’s third-largest IT outsourcing firm, also appear to have targeted a number of other competing providers, including Infosys and Cognizant, new evidence suggests. The clues so far suggest the work of a fairly […]

Read more
Faking env() to Use it Now

.mega-header::before { content: “”; position: absolute; top: 0; right: 0; width: 75%; height: 90%; background-image: radial-gradient(ellipse closest-side, rgba(15, 14, 22, 0.5), #100e17), url(https://res.cloudinary.com/css-tricks/image/fetch/w_1200,q_auto,f_auto/https://css-tricks.com/wp-content/uploads/2018/05/iphone-x-environment-variables.jpg); background-size: cover; background-repeat: no-repeat; opacity: 0.75; } Share this: There is already an env() function in CSS, but it kinda came out of nowhere as an Apple thing for dealing with “The […]

Read more
Why McAfee is Supporting the University of Guelph’s New Cyber Security and Threat Intelligence Degree Program

McAfee has a rich history in helping to shape the industry’s response to the ever-changing threat landscape.  We started as a pioneer in cybersecurity over three decades ago. Today, we are the device to cloud cybersecurity market leader, supporting consumers to small and large enterprises to governments. But we don’t do this on our own. […]

Read more
Embracing creativity to improve cyber-readiness

How approaching cybersecurity with creativity in mind can lead to better protection from digital threats This Sunday April 21st is World Creativity and Innovation Day, a day to celebrate and encourage creative thinking across all disciplines. It is easy to think of creativity as a skill confined to the arts, when in fact creativity and […]

Read more
Tips for the Aftermath of a Cyberattack

Incident response demands technical expertise, but you can’t fully recover without non-IT experts. Incident response teams need technical skills from security experts who can analyze and contain cyber threats. They also demand strategic and communications skills from employees who aren’t as tech-savvy but equally essential to getting the business back up and running. “When you […]

Read more
Top