0

Leveraging AI to protect our users and the web

Posted by Elie Bursztein, Anti-Abuse Research Lead – Ian Goodfellow, Adversarial Machine Learning Research Lead Recent advances in AI are transforming how we combat fraud and abuse and [...]

0

Game Over! Malicious Minecraft Character Skins Infect Over 50,000 Accounts

Video games allow users to become a whole new persona, to experience imaginary worlds, and live out scenarios that are beyond their wildest dreams. One of the most popular video games out there, [...]

0

McAfee vNSP and AWS Are Winning Combination for Enterprise and Federal Customers

Fun Facts: ECS stood up and managed the first security operations center at the White House. Today, ECS manages the world’s largest McAfee installation—employing just about every [...]

0

Cloud Credentials: New Attack Surface for Old Problem

Researchers show why keeping a handle on user credentials is just as hard in the cloud as it is on local networks.

0

You vs. the Internet: 5 Hands-On Ways to Begin Safeguarding Your Family’s Privacy

Data mining. Privacy breaches. Malicious third parties. Do you ever feel like these scary sounding, albeit significant, concerns got left at the curb somewhere between carpool duty, doctor [...]

0

Perspectives on securing our election systems

I had the pleasure of sitting on a panel at CyberScoop’s CyberTalks event this week, which coincides this year with the RSA 2018 Conference in San Francisco. Our discussion focused on the [...]

0

Casino’s High-roller Database Compromised by a Single IoT Thermometer

It’s no secret that IoT devices have caused some issues with security in the past. They’ve been used by cybercriminals to topple networks and hack into homes. Oh, and now breach [...]

0

DNS over TLS support in Android P Developer Preview

Posted by Erik Kline, Android software engineer, and Ben Schwartz, Jigsaw software engineer [Cross-posted from the Android Developers Blog] The first step of almost every connection on the [...]

0

Despite Decline in Use of Adobe Flash, Vulnerabilities Will Continue to Cause Concern

This post was researched and written with the assistance of Tim Hux, Abhishek Karnik, Asheer Malhotra, and Steve Povolny McAfee Advanced Threat Research team analysts have studied Adobe Flash [...]

0

How McAfee uses Customer Zero to get to decisions faster

The third in a series of three blogs by Grant and Jason on the process of identifying actionable insights. In this series, we’ve been examining how data is collected, processed and [...]