Feeds & Podcasts

Enterprise Blogs

Meet the Bloggers

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

Embedded

The Embedded Devices market is growing exponentially. Learn more about the critical need for securing embedded devices and the various trends in verticals such as healthcare, automotive, mobile, retail/Point-of-Sale, manufacturing, critical infrastructure, military/aerospace and others industries utilizing embedded device.

Posts in Embedded

Security Challenges in the Rapid Adoption of Technology into the Basics of Driving

Monday, January 23, 2012 at 12:27pm by Ryan Permeh
Ryan Permeh

With some predictions of “self driving cars” being available to consumers as early as 2018, the rapid adoption of technology into the basics of driving is posing some interesting challenges from a security standpoint. In a recent TV news report, Closer Look: Newer Cars May Pose Hacking Risk, McAfee’s Brian Contos discusses some of these Read more…

Tags: , , , , , , ,

Networked Printers at Risk

Friday, December 30, 2011 at 10:10am by Jimmy Shah
Jimmy Shah

Multifunction printers (MFPs) have been common in offices for years. They let employees print, scan, and copy documents. Two separate talks at the 28th Chaos Communications Congress (28c3) show how attackers can infect these trusted office devices. Hacking MFPs In Andrei Costin’s presentation “Hacking MFPs,” he covered the history of printer and copier hacks from the Read more…

Tags: , , ,

Thanks Forrester. I Couldn’t Have Said It Better Myself.

Tuesday, December 13, 2011 at 12:02pm by Tim Fulkerson
Tim Fulkerson

I’ve said it before, and I’ll say it again: “Embedded security will soon become a key differentiator for any solution that contains IP-enabled embedded devices.” That may seem a pretty adventurous prediction considering how commonplace embedded devices have become in automobiles, environmental and industrial control systems, retail point of sale systems, cameras, smartphones, medical devices, Read more…

Tags: , ,

McAfee and Wind River Webinar Thursday: Embedded Security

Wednesday, November 9, 2011 at 9:20am by Brian Contos
Brian Contos

The number of connected devices is increasing exponentially, and expected to grow to 50 billion by 2020, according to Ericsson CEO Hans Vestberg. This dramatic increase in device connectivity is creating a potential tsunami of security vulnerabilities with serious implications as hackers, organized crime, terrorist organizations and even nation states begin to focus their attacks Read more…

Tags: , ,

Caution: Automobile Vulnerabilities are Closer Than They Appear

Thursday, September 22, 2011 at 4:19pm by Tim Fulkerson
Tim Fulkerson

Remember when automobiles provided basic transportation and little else? Well, those days faded from sight in your rear-view mirror years ago. Today’s cars can be started by your mobile phone and disabled from the Internet. Soon, some will even drive themselves. Many new models feature state-of-the-art infotainment systems, social networking capabilities and in-vehicle Wi-Fi hotspots. Read more…

Tags: ,

Embedded Devices Are Being Hacked (and Now that I’ve Got Your Attention…)

Thursday, September 22, 2011 at 4:06pm by Tim Fulkerson
Tim Fulkerson

Have you seen headlines like these lately?: “Skimmer Siphoning Card Data at the Gas Pump” or “Restaurants Sue Vendors After Point-of-Sale Hack.” How about “Insulin Pump Hack Exposes Medical Device Danger” or “Stunex Computer Worm has Vast Repercussions”? ATMs, point-of-sale (POS) terminals, kiosks, medical equipment, SCADA systems and other embedded devices are being hacked in ever-increasing Read more…

Tags: , , , , ,

Boldly Going Beyond The World Of PC’s

Friday, April 1, 2011 at 10:26am by Stuart McClure
Stuart McClure

Last month at the RSA Conference, McAfee announced a partnership with Wind River to develop, market and support security solutions for non-PC devices. Today, marks the first implementation of this relationship and the first step toward the vision for securing embedded devices and the world beyond PCs. The release of the Common McAfee Agent (CMA) Read more…

Tags: , , , , ,