0 Comments
A known vulnerability in MikroTik routers is potentially far more dangerous than previously thought. A cybersecurity researcher from Tenable Research has released a new proof-of-concept (PoC) RCE attack for an old directory traversal vulnerability that was found and patched within a day of its discovery in April this year. The vulnerability, identified as CVE-2018-14847, was
0 Comments
Every three months, our team crafts the McAfee Labs Threats Report. The quarterly report ranges in topic and severity but always touches on the most important and impactful threats afflicting consumers and companies alike. This year, the McAfee Labs team analyzed an average of 1,800,000 URLs, 800,000 files and 200,000 high-risk files to produce the McAfee
0 Comments
A regional US fast food chain has become the latest victim of the notorious Fin7 hacking group after a breach of card data involving countless customers. The FBI informed Pacific North West chain Burgerville on August 22 that it had been a target of the group, also known as Carbanak. It was believed that the
0 Comments
Some tips for helping to keep your data more secure from the floor of VB 2018 With the proliferation of more advanced and freely available toolsets, commoditization of attack launch platforms, and availability of wholesale large-capacity network bandwidth for rent, cyberattack velocity is ramping up. If there’s a new vulnerability released you’ll get hit harder
0 Comments
Apple, Amazon and Microsoft have already held their big fall events — and now it’s Google’s turn. Over the past couple of years, the October event has become an increasingly important platform, as the company continues to press into various hardware categories. And really, it’s Google’s last chance to make a big splash ahead of
0 Comments
Officials in the U.S., Canada, U.K. and the Netherlands formally accused seven officers of Russia’s GRU military intelligence agency with cyberattacks targeting individuals and organizations involved in international anti-doping efforts. The GRU indictment from the U.S. Department of Justice (DOJ) charged Aleksei Sergeyevich Morenets, Evgenii Mikhaylovich Serebriakov, Ivan Sergeyevich Yermakov, Artem Andreyevich Malyshev, Dmitriy Sergeyevich
0 Comments
Credential phishing campaigns, in which high-profile individuals are unwittingly falling victim to malicious actors who are looking to gain access into business systems, have proven to be a successful attack vector. According to a new Menlo Security report, Understanding a Growing Threat: Credential Phishing, credential phishing is a quickly growing cyber-attack and is increasingly becoming
0 Comments
On Tuesday, Tencent Music Entertainment filed for an IPO in the US that is expected to value it in the $25-30 billion range, on par with Spotify’s IPO in April. The filing highlights just how different its social interaction and digital goods business is from the subscription models of leading music streaming services in Western
0 Comments
The Gillmor Gang — Frank Radice, Keith Teare, Michael Markman, Denis Pombriant, and Steve Gillmor . Recorded live Sunday, September 23, 2018. Turn out or turn off, media as anesthesia, what it is until it isn’t. G3: Believe Me — Elisa Camahort Page, Francine Hardaway, Maria Ogneva and Tina Chase Gillmor. Recorded live Friday, September
0 Comments
At McAfee, we value keeping customers at the core of our business. We deeply care about serving our clients and partners with excellence and we actively work to implement changes based on their suggestions. One of the ways we receive this feedback is through The Channel Company’s Annual Report Card survey. The Annual Report Card
0 Comments
A security vendor has discovered nearly 200 domains spoofing legitimate UK news sites in order to spread fake news. DNS security firm DomainTools ran a search on five of the UK’s most popular sites: BBC News, Sky News, ITV News and the websites of the Guardian and the Daily Mail newspapers. It discovered 197 domains
0 Comments
by Lisa Vaas Step aside Amazon, drone deliveries are already a thing in prisons. There are many things that conspirators on the outside can do drone-wise: drop mobile phones, chargers, batteries, drugs, knives, memory cards, earphones, saws, or even drills. There are also many ways for those drone drops to be duds: sometimes they crash
0 Comments
by Mark Stockley Over the summer I decided to give my kids an old Apple laptop to share. We use laptops for school homework from time to time but my kids spend most of their screen time poking and swiping tablets. I wanted to broaden their horizons a little: do a bit of coding; a