Sunday, May 27, 2018
With More Than 1,200 Cybersecurity Vendors in the Industry, How Do You Stand Out?

With More Than 1,200 Cybersecurity Vendors in the Industry, How Do...

Like most who attend RSA, I set a goal for myself to walk through the North and South exhibit halls and stop by every booth to “keep up” with the latest messaging and capabilities across the cyber landscape. I started off the day optimistic and full of enthusiasm. This year, I decided to keep track…
White Hat Spoofs 2FA, Sends User to Phishing Page

White Hat Spoofs 2FA, Sends User to Phishing Page

White Hat Spoofs 2FA, Sends User to Phishing PageSocial engineering tactics are the bread and butter of hackers. Preying on trust, malicious actors are able to lure users into sharing personal information, even login credentials. White hat hackers will often leverage these same tactics for good, which Kevin Mitnick, chief hacking officer, KnowBe4 demonstrated in a…
Keep Your Mum Safe This Mother’s Day!

Keep Your Mum Safe This Mother’s Day!

On my first Mother’s Day 21 years ago, I received a pair of gorgeous fluffy pink slippers. Last year – it was a sleek shiny green Fitbit! Technology has absolutely transformed our gift giving and Mother’s Day is no exception. The rising popularity of internet connected gifts means many lucky mums will receive a glossy…
Bolton's Push to Cut Security Post Not Sound

Bolton's Push to Cut Security Post Not Sound

Bolton's Push to Cut Security Post Not SoundIn the aftermath of President Trump pulling out of the Iran nuclear deal, there has been much anticipation of retaliatory cyber-attacks against the US. With the paramount goal of preparing to defend against potential threats, the news that national security adviser, John Bolton, aims to eliminate the role…
McAfee Protects Against Doppelgänging Technique

McAfee Protects Against Doppelgänging Technique

That adversaries adopt new techniques is a known fact. However, the speed they include new innovative techniques to bypass end-point security and or evade sandboxing appears to be at an ever-increasing pace. Indeed, adversary adoption is often faster than the InfoSec industry can implement and test effective countermeasures. For example, in December 2017, a tool…
Chrome Extension Malware Targets Facebook

Chrome Extension Malware Targets Facebook

Chrome Extension Malware Targets FacebookA new malware campaign detected by Radware's threat research group is reported to be proliferating through fraudulent Facebook links. According to the research of Adi Raff and Yuval Shapira, the malware infects users by abusing a Google Chrome extension, the Nigelify application. Hence the malware has been dubbed Nigelthorn.  "The original…
Syn/Ack Unique Proactive Protection Technique

Syn/Ack Unique Proactive Protection Technique

McAfee’s Advanced Threat Research team has performed analysis on samples of Syn/Ack ransomware implementing Process Doppelgänging.  For those who are concerned about the potential impact of this ransomware but are currently unable to implement McAfee product protections, we have found a simple but interesting alternative method.  Prior to encryption and ransom, the malware first checks…
Firefox 60's WebAuthn API: No Password Required

Firefox 60's WebAuthn API: No Password Required

Firefox 60's WebAuthn API: No Password RequiredIn the web browser war, Mozilla is positioning itself to dominate over the competition with its release of Firefox 60, which includes the option of a password-less signin.  The latest version of the Firefox browser uses a Web Authentication API, WebAuthn for short, which enables authentication using public key…
Cyber Storm: Strengthening Cyber Preparedness

Cyber Storm: Strengthening Cyber Preparedness

This past April, McAfee employees joined with more than 2000 members of the private industry, federal government, and international partners to participate in a three-day cyber exercise called Cyber Storm, led by the Department of Homeland Security (DHS). The goal of the exercise was to simulate discovery and response to a large-scale, coordinated cyber-attack impacting…
The Call for Surge in AI Can Not Ignore Security, Risk

The Call for Surge in AI Can Not Ignore Security, Risk

The Call for Surge in AI Can Not Ignore Security, RiskWhen it comes to technology, the old adage "if it ain't broke, don't fix it" won't fly. Technology can and will eventually break, and AI technology is no exception. AI is gaining popularity, but advancements for the sake of keeping up in the global marketplace won't ensure that…

Recent Posts