#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety Friday Security Highlights global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile malware mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity
Where does one start? I’m not sure if I would consider this a research blog post. In the sea of comments and chatter today, it just feels right to say something. It feels right to “Think Different.” Like many others, I was raised an Apple faithful. Later I came to embrace and believe in not just the products but Read more…
Tags: Apple, Family Safety, mac, Mac OS X, McAfee Identity Protection, Steve Jobs
Hi, everyone. I am very excited to announce that I recently joined McAfee Labs. As many of you know, I have spent more than 20 years doing anti-virus (AV) development and research. Needless to say, I am not happy to see the new developments in fake AV software. Fake AV developments began only a few Read more…
Tags: Apple, Cybercrime, Data Protection, Endpoint Protection, Fake AntiVirus, Family Safety, global threat intelligence, identity protection, identity theft, malware, OS/X
Apple users should be on the lookout for fake antivirus software and other malware targeting the Mac platform, McAfee warns While it used to be that Mac users felt somewhat insulated from the variety of malware threats circulating the web, cybercriminals have noted the growing popularity of Apple products and are now distributing malware aimed Read more…
Tags: Apple, consumer threat alert, fake anti-virus software, iPad, iphone, mac, malware
One of the most prevalent families of recent Trojans is called fake alerts. These Trojans generate fake warning screens that look like they were generated by legitimate security or anti-malware software. The majority of malware within this family attempts to con users by convincing them that their systems are at risk and that they should purchase Read more…
Tags: Apple, Cybercrime, Data Protection, Endpoint Protection, Family Safety, global threat intelligence, identity fraud, identity protection, identity theft, Mac OSX, malware, security
This month, Apple published seven security updates resolving around 250 issues. The last patch is arrived yesterday; it addressed Mac OS X 10.6.7. Adding the CVE IDs (for Common Vulnerabilities and Exposures) listed in each patch does not give us accurate view of the number of vulnerabilities involved. Several appear in more than one patch: Read more…
Tags: Apple, Microsoft, patch, vulnerability
Some of the most interesting research on mobile botnets is being done in the lab. Security researchers Collin Mulliner and Jean Pierre Seifert have put together a robust Proof-of-Concept (PoC) iPhone botnet. Their research was presented at the 5th International Conference on Malicious and Unwanted Software (MALWARE 2010) last week. In a presentation titled “Rise Read more…
Tags: Apple, botnets, Cybercrime, Data Protection, Endpoint Protection, iphone, Mobile, mobile security, research
Today, McAfee has expanded its platform coverage to iPhone, iPod touch and iPad. Did you know that twice as many kids today own an Internet-enabled mobile device versus a computer? [1]. Children and adolescents are constantly connected to the online world; in fact, 65% of iPod touch and 13% of iPhone users are below the Read more…
Tags: Apple, Family Safety, iphone, Mobile, mom
Today we announced our McAfee® Family Protection iPhone®, iPod touch® and iPad™ Edition. McAfee now provides strong parental controls to keep young people safe when they are browsing the Internet on an Apple mobile device. McAfee released McAfee Family Protection for the PC in June 2009. According to data released by Admob in 2010, 65 Read more…
Tags: Apple
Why is there such a dust storm over the recent ATT iPad disclosure? The reality is this type of vulnerability isn’t really news and happens all day long.
Tags: Apple, Foundstone, iPad, web security
Snow leopards are endangered species that need to be protected from extinction. But it’s not only the animal that needs protecting. Apple’s latest release of Mac OS X 10.6, named Snow Leopard, claims to be the “world’s most advanced operating system.” McAfee provides the protection users and business need to ensure this new operating system Read more…
Tags: Apple, Consumer, Cybercrime, Endpoint Protection, malware
Posts tagged under Apple