Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

McAfee Labs Report: August 2015h


  • Please log in to reply
No replies to this topic

#1 CodeSmasha

CodeSmasha

  • Banned
  • 524 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:49 AM

Posted 20 September 2015 - 06:41 AM

In the McAfee Labs Threat Report: August 2015, published last month, we discussed about our three key topics:

  • A retrospective look at the changes in cyberthreats and cybersecurity since Intel announced the acquisition of McAfee five years ago.
  • The specific tactics and techniques used by attackers to surreptitiously ex-filtrate data.
  • An examination of GPU attacks and what might be possible today.

McAfee + Intel: A Five Year Retrospective

August marked the fifth anniversary of Intel's announcement that it would buy McAfee. Since that time much has changed in the cybersecurity world. For this retrospective, we brought together a dozen thought leaders from Intel & McAfee who have been here before the acquisition to explain how the cybersecurity marketplace and our work together has evolved.

 

We discuss the evolution in our thinking about security in silicon, our views at the time about the "Perfect Storm" approaching in the cybersecurity world and how the storm has played out, the challenges we saw in emerging hard-to-detect attacks, and our 2010 expectations for the new device types vs the reality of the marketplace. We also discussed about some of the things that surprised us, most notably the transformation of cybercrime into a full-fledged industry.

 

Data Exfiltration: An Important Step In the Cyberthief's Journey

The last 10 years have produced a monumental increase in the number of major data breaches and the volume of records stolen, from T.J. Maxx's 2007 breach of 94 million to this year's theft of 80 million Anthem Patient Records. This key topic focuses on an important step in the data theft process: Data Exfiltration. it is the way in which a cyberthief copies or moves data from the owner's network to one the thief controls. We examine attacker types, their motivations, and their likely targets; the methods and mechanisms they use to steal data; and policies businesses should embrace better detect exfiltration.

 

GPU Malware: Separating Fact from Fiction

Malware attacks on graphic processing units (GPUs) have been around for years. In fact, a form of GPU Malware has been active out in the wild for at least four years-in the form of Bitcoin-Mining Trojans that leverage GPU performance to increase the payout from each victims infected computer.

 

Recently, a group published three proof-of-concept projects that together claim to use GPUs as instruments of evasion by running code and storing data on GPUs-where no one is looking. In this key topic, we break down the projects claims into their components to establish what might be possible through the use of these software modules.

 

How To Keep Safe:

Make sure you have the latest updates for all your software.

Have an Antivirus Program such as Malwarebytes, Avast, Mcafee or Bitdefender.

Make sure to change your passwords every month or so.

Have Fun Safe Surfing the Web!

 

To read more about the August 2015 Lab Report from Mcafee visit the website: http://www.mcafee.com/au/resources/reports/rp-quarterly-threats-aug-2015.pdf



BC AdBot (Login to Remove)

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users