#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity
With a dazzling laser show, the 26th Chaos Communication Congress (26c3) in Berlin, the last big security conference of 2009, has ended. If you haven’t been here, you might have missed fewer of the sessions than people on site, thanks to the worldwide availablility of live streams (and recordings). What you did miss was meeting Read more…
Cybercriminals love to use social engineering techniques to trick users into installing their malware. One of the latest fake-alert variants attempts to trick users into believing the software is related to or hosted by McAfee: mcafeevirusremover.com. With DAT release 5835 (December 17) McAfee detects the HTML code for the domain as FakeAlert-KW!htm and the associated Read more…
Day 2 and Night 2 of the 26th Chaos Communication Congress is over, so it’s time for a short update on what you are missing here. This year the Congress is organized as a distributed event: Many local Hacker Spaces have joined the network at Berlin Conference Center, giving access to resources and talks to Read more…
Although most people enjoy the days between Christmas and New Year’s Eve with their families, hackers, geeks, security enthusiasts, and privacy activists meet in Berlin for the world’s oldest and Europe’s biggest annual Hacker Conference. Now in its 26th year (I was a 13-year-old kid, trying to figure out what to with a Sharp 1211, Read more…
With the New Year just days away, it’s time for McAfee Labs 2010 Threat Predictions. What should you be wary of in the coming year? Social networks. Sites such as Twitter and Facebook have changed the way we communicate, interact, and share on the web. As user bases for the top online social destinations reach Read more…
The innovations that are taking place in the computer industry today are truly amazing. More specifically, these innovations have driven the infrastructure expansion of the Internet, created world wide access to trade and commerce, virtualization, consolidation and mobility, to name a few. These technology advancements have driven static Web sites, applications and now operating systems Read more…
Tags: Web 2.0
Koobface has been busy. Activities associated with the worm have increased during the month of December. Often the activity is sending traffic to compromised servers to obtain more servers. Other times it uses those compromised servers to proxy users to malicious domains that distribute more malware or take control of the infected machines. This morning Read more…
I’m happy to share that Channel Insider has recognized the McAfee channel team with the 2009 Bull’s Eye Award for Turnaround of the Year. Our efforts in revamping the McAfee channel program, by turning partner feedback into action, have not gone unnoticed and I assure you the momentum gained in 2009 will only continue. Read more…
Tags: awards, Channel Program
Howard is a great pick for the job but has many tough fights ahead. He’s got to navigate the choppy political waters, bring all of industry to the table, build international support, and be the strong voice of cybersecurity to coordinate the many agencies and private forces.
Tags: Corporate Responsibility, Cybercrime, Dave DeWalt, government, public policy
This week (18th December 2009) Jamaica moved its Cyber Crime bill into law making it possible to prosecute hackers and people who use nefarious popups to collect personal data. The Jamaica Observer reports: The Bill, which was passed with eight amendments, will see persons convicted of breaches facing a maximum sentence of 10 years’ imprisonment and a Read more…
Tags: Data Protection