News

  • Test Post 2 – 5 Dec Prod Release

    PRIVACY PRIVACY testasofasfaslfasdahsdiohasodihasodnaosdinaisdnasdnaobvscivbxcv !@#$%^&*()_+<>????~ The post Test Post 2 – 5 Dec Prod Release appeared first on McAfee Blog. Read More

    Read More

  • Test Post – Prod Release 5 Dec

    PRIVACY PRIVACY test post test post test postiowfwfsdfffffffffffffffffffffffffffoiwheoir weroihorih dzfhsdfgusdkfsdkjfbasdlkfnsdlkfjsdjkf !@#$%^&*()_+<>?~ The post Test Post – Prod Release 5 Dec appeared first on McAfee Blog. Read More

    Read More

  • ‘Tis the Season for Holiday Scams

    PRIVACY PRIVACY This time of year, the air not only gets chillier but a bit cheerier for everyone … including online scammers. Holiday scams are a quick way to make a buck, and cybercriminals employ several holiday-themed schemes to weasel money and personally identifiable information (PII) from gift givers.  Here are three common holiday scams…

    Read More

  • Friday Squid Blogging: Legend of the Indiana Oil-Pit Squid

    PRIVACY PRIVACY At a GMC plant. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More

    Read More

  • Existential Risk and the Fermi Paradox

    PRIVACY PRIVACY We know that complexity is the worst enemy of security, because it makes attack easier and defense harder. This becomes catastrophic as the effects of that attack become greater. In A Hacker’s Mind (coming in February 2023), I write: Our societal systems, in general, may have grown fairer and more just over the…

    Read More

  • Google Increases Android Security With Memory-Safe Programming Languages

    PRIVACY PRIVACY The number of memory safety vulnerabilities in Android dropped from 223 in 2019 to 85 in 2022 Read More

    Read More

  • ‘Black Proxies’ Enable Threat Actors to Conduct Malicious Activity

    PRIVACY PRIVACY First used as botnets, their lucrative nature turned them into independent criminal enterprises Read More

    Read More

  • Hackers Use Archive Files and HTML Smuggling to Bypass Detection Tools

    PRIVACY PRIVACY HP’s latest report suggests 44% of malware was delivered via archive files in Q3 2022 Read More

    Read More

  • Industry Coalition Urges Congress to Hold off on SBOMs Requirements for Defense Contractors

    PRIVACY PRIVACY The coalition outlined the need to refine SBOM requirements before making it an obligation for defense contractors Read More

    Read More

  • Whoops! Researchers accidentally crash botnet used to launch DDoS and cryptomining campaigns

    PRIVACY PRIVACY Researchers investigating a newly-discovered botnet have admitted that they “accidentally” broke Read more in my article on the Tripwire State of Security blog. Read More

    Read More

News, Advisories and much more

Exit mobile version