admin

0 Comments
McAfee has announced the acquisition of cloud security start-up NanoSec in a move designed to help reduce container-related risk for its customers and accelerate DevSecOps. Cupertino-based NanoSec is described as a pioneer in simplifying app workload protection, with a zero-trust offering that works across multiple computing and containerized environments irrespective of the underlying infrastructure. The
0 Comments
LAS VEGAS — Cyberattacks against global oil and gas facilities are increasing, and the threats could have catastrophic results, according to new research. In a report published last week titled, “Global Oil and Gas Cyber Threat Perspective,” cybersecurity vendor Dragos Inc. detailed how industrial control system (ICS) security threats are on the rise for oil
0 Comments
The McAfee Labs Advanced Threat Research team is committed to uncovering security issues in both software and hardware to help developers provide safer products for businesses and consumers. We recently investigated an industrial control system (ICS) produced by Delta Controls. The product, called “enteliBUS Manager”, is used for several applications, including building management. Our research
0 Comments
The competition for control of the burgeoning market for burger replacements (and other alternatives to animal proteins) continues to heat up. Beyond Meat and Impossible Foods the two leading contenders for top purveyor of plant-based patties (and other formulations) have spent most of the typically sleepy summer months jockeying for the position as top supplier
0 Comments
One of the scarier notions in the world today is the prospect of American voting machines being compromised at scale: voters thrown off rolls, votes disregarded, vote tallies edited, entire elections hacked. That’s why the nation’s lawmakers and civil servants flocked (relatively speaking) to Def Con in Las Vegas this week, where hackers at its
0 Comments
by Lisa Vaas A “preferred Facebook Marketing Partner” has secretly tracked millions of Instagram users’ locations and stories, Business Insider reported on Wednesday. Facebook has confirmed that San Francisco-based marketing firm HYP3R scraped huge quantities of data from Instagram in order to build detailed user profiles. Profiles that included users’ physical whereabouts, their bios, their
0 Comments
Management. Control. It seems that you can’t stick five people in a room together without one of them trying to order the others around. This tendency towards centralized authority is not without reason, however – it is often more efficient to have one person, or thing, calling the shots. For an example of the latter,
0 Comments
ESET researchers document malware-distributing spam campaigns targeting people in France In May 2019, ESET researchers observed a spike in ESET telemetry data regarding malware targeting France. After further investigations, we identified malware that distributes various types of spam. One of them is leading to a survey that redirects to a dodgy smartphone promotion while the
0 Comments
The increase in cyberattacks over the last couple of years is staggering. With this rise in attack frequency and the overall cost of prevention and remediation so high, it’s reasonable to assume a cyberattack is a much more probable cause of taking down your organization than any natural disaster. It’s therefore imperative to secure your
0 Comments
Avaya is the second largest VOIP solution provider (source) with an install base covering 90% of the Fortune 100 companies (source), with products targeting a wide spectrum of customers, from small business and midmarket, to large corporations. As part of the ongoing McAfee Advanced Threat Research effort into researching critical vulnerabilities in widely deployed software
0 Comments
Facebook has filed a lawsuit against two shady Android app developers accused of making illegal money by hijacking users’ smartphones to fraudulently click on Facebook ads. According to Facebook, Hong Kong-based ‘LionMobi’ and Singapore-based ‘JediMobi’ app developers were distributing malicious Android apps via the official Google Play Store that exploit a technique known as “click