The massive hack against Target, in which 40 million credit and debit card numbers were stolen, began with stolen login credentials from the air-conditioning repairman. This illustrates the old adage, “a chain is only as strong as its weakest link.” While consumers can’t control why a third party contractor would have external network access at […]
In conjunction with our investigation into Operation Troy, we will be releasing IOC data in the open and highly flexible OpenIOC Framework format. The McAfee Operation Troy IOC can be downloaded here. In addition to various open/free tools, OpenIOC data can be consumed by: McAfee Read more…
Sometimes you just get that feeling—whether it has to do with betting ‘all in’ during a game of Blackjack or visiting a sketchy website when shopping online—there’s definitely something to be said about listening to your intuition. With the number of data breaches and online scams on the rise, more and more shoppers are going Read more…
As we say goodbye to this year and usher in the next, it’s important to look back on some recent events that occurred with respect to consumer security. Businesses have a responsibility to keep personal and financial data safe, and part of that comes from staying informed on the latest cyber perils your customers are Read more…