Thursday, March 30, 2017

Spora Ransomware Infects 'Offline'-Without...

Learn how to spot Spora - ransomware that encrypts victims’ files and can work even offline.

Spora Ransomware Infects 'Offline'-Without...

Spora is a ransomware family that encrypts victims’ files and demands money to decrypt the files. It has infected many computers in a short time due to a huge spam campaign. It has a very special feature—to work offline.
Intel Business Social Hub

Schools Become Tempting Targets in Cyberwar

A #security audit can be a useful tool for schools looking to protect their data.

Schools Become Tempting Targets in Cyberwar

Many schools might not have the money for a dedicated cybersecurity employee, but an audit and some best practices can go a long way.
Intel Business Social Hub

Security-Intelligence Systems and the Future of...

Understanding avenues of cyberattack with #security intelligence is vital.

Security-Intelligence Systems and the Future of...

Understanding and implementing security intelligence, a methodology that encourages organizations to chart all the possible methods of attack, is an extremely useful practice.
Intel Business Social Hub

Friday, March 24, 2017

Analyzing a Fresh Variant of the Dorkbot Botnet

A new variant of the #Dorkbot botnet has emerged. Here's @McAfee's analysis of it. #IamIntel

Analyzing a Fresh Variant of the Dorkbot Botnet

At McAfee Labs, we have recently observed a new variant of the Dorkbot botnet. Dorkbot is a well-known bot, famous for its various capabilities including backdoor, password stealing, and other malicious behavior.
Intel Business Social Hub

We Must Automate Cyber Threat Defense to Survive

"We must automate cyber threat defense to survive," says @Ken_Kartsen. #IamIntel

We Must Automate Cyber Threat Defense to Survive

In a time of ever-increasing IT complexity, government agencies are continually being asked to do more with less.
Intel Business Social Hub

Thursday, March 23, 2017

Lead Information Security Engineer Interview...

Here from a lead information engineer about migrating to McAfee Endpoint Security. #IamIntel

Lead Information Security Engineer Interview...

Chris T. is the lead information security engineer on a team that oversees a host of McAfee endpoint and network products at his U.S. insurance company with approximately 8,000 endpoints. The company recently migrated endpoints to ENS 10.2 and plans to migrate to ENS 10.5 in the next three months.
Intel Business Social Hub

Tilting the Playing Field: How Misaligned...

Learn from this survey of 800 #cybersecurity professionals about how companies can be more competitive. #IamIntel

Tilting the Playing Field: How Misaligned...

In a new report commissioned by Intel Security, "Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity," the Center for Strategic and International Studies surveyed 800 cybersecurity professionals to reveal how a mismatch of incentives gives cybercriminals an advantage.
Intel Business Social Hub

Wednesday, March 22, 2017

New Assessment Warns Industry that Cyber...

UK agency warns that cyber criminals are imitating the way suspected nation state actors attack.

New Assessment Warns Industry that Cyber...

The annual assessment of the biggest cyber threats to UK businesses emphasises the need for increased collaboration between industry, government and law enforcement in the face of a growing and fast-changing threat.
Intel Business Social Hub

5 Cybersecurity Predictions for FSI

A secure #IoT will be a challenge moving forward for FSI, along with other roadblocks.

5 Cybersecurity Predictions for FSI

FSI is facing big security vulnerabilities and challenges. Securing the IoT and protecting against smarter attacks will be a priority.
Intel Business Social Hub

Busting the Malware Silver Bullet Myth

There's no “silver bullet” for every #security threat. Join this @McAfee Tech Talk to learn more. #IamIntel

Busting the Malware Silver Bullet Myth

Join Josh Thurston from the McAfee Office of the CTO, on this Tech Talk to learn how McAfee Endpoint Security combats targeted attacks.
Intel Business Social Hub

Tuesday, March 21, 2017

Data Sovereignty and Moving to The Cloud

You can break #data sovereignty difficulties into 3 blocks that make it manageable.

Data Sovereignty and Moving to The Cloud

Data sovereignty doesn’t have to be impossible to understand. Break it down into where your data needs to reside, the fine print, and the transparency of your cloud services.
Intel Business Social Hub

Monday, March 20, 2017

The Hidden Problem with Easy Cybercrime

Using ransomware is easy, which is part of what makes it such a #security problem. #IamIntel

The Hidden Problem with Easy Cybercrime

Ransomware creates enormous problems for cybersecurity, not only because of its dangers, but because it is very easy for anyone to start using it to steal.
Intel Business Social Hub

10 Ways to Reduce Insider BYOD Threats

BYOD can be a real #security risk, and knowing when to say no to it is important.

10 Ways to Reduce Insider BYOD Threats

BYOD presents an emergent security threat for every business that allows it. Good policies and a culture of responsibility can make a big difference.
Intel Business Social Hub

Phishing for W-2s: Keeping Your Financial Data...

How to keep your financial data safe during #taxseason. #IamIntel

Phishing for W-2s: Keeping Your Financial Data...

Ready or not, here comes tax season. And as you’re getting your ducks in a row, prepping your W-2 forms, and speaking with your tax advisor, cybercriminals are devising a monetary strategy of their own—one focusing on your money, that is.
Intel Business Social Hub

Malware: 5 Tips for Fighting the Malicious...

5 tips for fighting #malware from @McAfee. #IamIntel

Malware: 5 Tips for Fighting the Malicious...

From an entire attack campaign on banks worldwide, to a strain residing within medical devices, to a variant that has learned to self-heal, the list of malware-based attacks goes on.
Intel Business Social Hub

Intel, Microsoft Launch New Bug Bounty Programs

.@Intel and @Microsoft launch new bug bounty programs, offering thousands in rewards.

Intel, Microsoft Launch New Bug Bounty Programs

Intel has finally joined the bug bounty game with financial rewards on offer up to $30,000.
Intel Business Social Hub

Friday, March 10, 2017

Helping Overburdened SOC Analysts Become More...

Here's how #security operations center analysts can become more effective threat hunters. #IamIntel

Helping Overburdened SOC Analysts Become More...

Security operations center analysts confront a tough paradox almost daily. In a perfect world, every SOC would have the resources to 1) proactively hunt or search for the presence of adversaries in the network, and 2) for analysts tasked with incident response activities, to profile the types of threats that they encounter on a daily basis, trying to determine attack and compromise vectors that will assist with the containment and eradication strategy.
Intel Business Social Hub

Are big banks now finally now on the same...

The hybrid #cloud approach is proving to be a secure and solid option for banks.

Are big banks now finally now on the same...

Banks are embracing the cloud, and while there’s some debate about the merits of public vs. private, many are opting for a hybrid approach.
Intel Business Social Hub

When Vending Machines Attack

As one university’s struggle with a botnet shows, our #IoT devices need better #security.

When Vending Machines Attack

Due to insufficient security, many automated devices are causing problems. One university’s vending machines rebelled after a botnet attack.
Intel Business Social Hub

Six Ways to Defend Against Digital Threats

A robust #cybersecurity plan requires a mindset that incorporates many disparate concepts.

Six Ways to Defend Against Digital Threats

A holistic approach to cybersecurity, as well as robust security on the edge are requirements to keeping your organization safe.
Intel Business Social Hub

Thursday, March 9, 2017

The Answer to Big Cybersecurity Challenges:...

"Cybersecurity needs a Dream Team, like the 1992 Olympics," says @youngdchris. #IamIntel

The Answer to Big Cybersecurity Challenges:...

While cybersecurity and potential threats against the digital experience have never been bigger, current defensive measures aren’t working. Tomorrow demands a different response from all of us, starting today.
Intel Business Social Hub

Macro Malware Targets Macs

Malicious code hidden in user forms and macros in Microsoft Office files now goes after Macs, too. #IamIntel

Macro Malware Targets Macs

Macro malware has been spreading for years. New techniques arise all the time to hide malicious code and thus increase the difficulty of analysis. However, just targeting Microsoft Windows no longer seems to be enough for the malware authors. The Mac appears to be the new challenge, and attackers appear to be rising to this challenge.
Intel Business Social Hub

Continuous Monitoring Can Help You Stop the Bad...

Companies need to move from passive prevention and detection #cybersecurity to proactive defense. #IamIntel

Continuous Monitoring Can Help You Stop the Bad...

Most security organizations have historically been focused on the prevention portion of the prevent-detect-correct threat defense lifecycle. The proliferation of some high-profile security breaches in the past few years, however, has demonstrated the weakness in that strategy.
Intel Business Social Hub

Researchers Simulate a Ransomware Attack on...

Ransomware could potentially target water supplies, #cybersecurity researchers say.

Researchers Simulate a Ransomware Attack on...

Ransomware is a major threat, and researchers from the Georgia Institute of Technology are proving it with a fake attack on a water supply.
Intel Business Social Hub

Tuesday, March 7, 2017

Wonder what the biggest concerns for #cloud...

Read the newest cloud report based on responses from 1,400 IT security pros from around the globe. #IamIntel

Wonder what the biggest concerns for #cloud...

Wonder what the biggest concerns for #cloud security professionals are? The answers, here: https://t.co/uojI6agTAJ
Intel Business Social Hub

CIO Blown Away with Migration to McAfee...

CIOs should partner with @McAfee because it is not only a leader but an innovator in technology. #IamIntel

CIO Blown Away with Migration to McAfee...

Advantage Waypoint recently deployed McAfee Endpoint Security 10.2 across the company’s approximately 1,500 endpoints, including three geographically dispersed data centers.
Intel Business Social Hub

Monday, March 6, 2017

Landmark Cybersecurity Proposals from White...

Intel looks to work with cybersecurity proposals from White House on workforce development & privacy. #IamIntel

Landmark Cybersecurity Proposals from White...

It’s great to see the White House leaning forward and taking action to improve our national Cyber Security posture by announcing a Cybersecurity National Action Plan (CNAP) and issuing an Executive Order to create a permanent Federal Privacy Council. Both initiatives will improve the national posture on cybersecurity and privacy – issues Intel believes are closely related.
Intel Business Social Hub

Unpacking Ransomware and the Ransomware Threat...

Hear from @Intel experts about the current #ransomware landscape. #IamIntel

Unpacking Ransomware and the Ransomware Threat...

Hear unique insights about the ever tending topic of ransomware with lessons to help further protect your organization.
Intel Business Social Hub

McAfee Labs 2017 Threats Predictions

Don't miss @McAfee_Labs 2017 Threats Predictions. #IamIntel

McAfee Labs 2017 Threats Predictions

McAfee Labs researchers offer long-lens predictions about cloud and internet of things (IoT) threats, laws, and vendor responses.
Intel Business Social Hub

Stop Attacks Before They Act with Dynamic...

See what the future of machine learning can do to improve threat protection in this @IntelSecurity video. #IamIntel

Stop Attacks Before They Act with Dynamic...

Learn about the Dynamic Endpoint along with Adaptive Threat Protection and the outcomes that benefit you.
Intel Business Social Hub

Protecting the Connected Home of the Future...

Any #smarthome must be safe, which is why McAfee Secure Home Platform blocks attacks at the router level. #IamIntel

Protecting the Connected Home of the Future...

McAfee Secure Home Platform automatically protects internet-connected devices on your home network from a variety of threats. Attacks are blocked at the router level, delivering robust security features that can be controlled from an easy-to-use mobile app.
Intel Business Social Hub