As I write this, it is one week from Thanksgiving, here in the United States. This is our kick-off to the holiday season, which got me thinking about our year-end and the realization that while there may be 36 shopping days till Christmas there are far fewer selling days before we reach our Dec. 28, Read more…
Tags: Alex Thurber, Commercial and Enterprise Deal Registration, Endpoint Protection, Endpoint security suite upgrade, Enhanced Deal Registration, gold software support, I Series, intrusion prevention, M Series, mcafee total protection, McAfee Vulnerability Manager, Risk Management, SMB Extravaganza
McAfee Labs is pleased to announce the availability of our “Fake Alert” Stinger – an improved Stinger tool with aggressive generic content targeted at enhanced detection and remediation of fake alert based threats. In our efforts to provide the best of protection for our customers against rogue security products or fake alert type malware – Read more…
Tags: Cybercrime, Data Protection, Endpoint Protection, fake alert, fake-av, Family Safety, identity protection, identity theft, malware
Anyone who has been in information security recently knows that it has gotten easier for cybercriminals to build stealth crimeware. The malware we deal with on a regular basis grows ever more difficult to find, while high-end targeted attacks such as Stuxnet and other advanced persistent threats (APTs, the abbreviation I hate) are using ever Read more…
Tags: advanced persistent threats, APT, crimeware, Cybercrime, Data Protection, Endpoint Protection, identity protection, malware, Network Security, Operation Aurora, rootkit, Rootkits, security, Stuxnet
Let’s face it: Most people–even folks in the security industry–have a hard time explaining botnets (robot networks of infected computers) in a way that your Uncle Joe or Aunt Betty can understand. Is it really a big deal? Yes, it is. With the rapid growth in malware and bot infections we’re seeing, it’s important for Read more…
Tags: bot, botnet, Cybercrime, Data Protection, Endpoint Protection, facebook, global threat intelligence, identity protection, malware, social networking, spam, Web 2.0, zombie, zombie computers
As we have discussed on this blog more than once, convictions for cybercrime activities are a rare thing indeed. Recently, however, a former University of Salford (United Kingdom) student was convicted and given a suspended sentence for stealing online gaming credentials. The University of Salford contacted the police after it received a complaint from a Read more…
Tags: credit card fraud and protection, Cybercrime, Data Protection, Endpoint Protection, Family Safety, identity theft, malware
Hi, everyone. I am very excited to announce that I recently joined McAfee Labs. As many of you know, I have spent more than 20 years doing anti-virus (AV) development and research. Needless to say, I am not happy to see the new developments in fake AV software. Fake AV developments began only a few Read more…
Tags: Apple, Cybercrime, Data Protection, Endpoint Protection, Fake AntiVirus, Family Safety, global threat intelligence, identity protection, identity theft, malware, OS/X
With Memorial Day just around the corner, we at McAfee Labs are already seeing the expected spams coming in. It is a common practice of spammers and cybercriminals to use holidays as a lure in their schemes; Memorial Day is no different. In reality, many spamming campaigns lead to the same websites, such as the Read more…
Tags: Cybercrime, Data Protection, Endpoint Protection, Family Safety, malware, spam
One of the perks of travel is access to Executive Lounges. One of the perks of Executive Lounges is that they often have VERY cool devices on display for the weary traveler to use. In one particular lounge I am currently in resides a very nifty Motorola XOOM: As I am in Korea at the Read more…
Tags: credit card fraud and protection, Cybercrime, data breach, Data Protection, Endpoint Protection, facebook, Family Safety, identity fraud, identity protection, identity theft, personal information protection
Last month, we hosted our April Security chat on Good to Great Enterprise Security Posture. We wanted to take a closer look at security from a business organization perspective and discuss how to go from good enterprise security strategy to great security strategy. To kick off the conversation, we started by asking about the top Read more…
Tags: Data Protection, Endpoint Protection, enterprise, identity protection, Security Connected
One of the most prevalent families of recent Trojans is called fake alerts. These Trojans generate fake warning screens that look like they were generated by legitimate security or anti-malware software. The majority of malware within this family attempts to con users by convincing them that their systems are at risk and that they should purchase Read more…
Tags: Apple, Cybercrime, Data Protection, Endpoint Protection, Family Safety, global threat intelligence, identity fraud, identity protection, identity theft, Mac OSX, malware, security
Posts tagged under Endpoint Protection