Feeds & Podcasts

Blogs

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

mobile security

Posts tagged under mobile security

Cross-Device Security Means “All Access”

Friday, January 13, 2012 at 6:21am by Robert Siciliano
Robert Siciliano

You may have a laptop, desktop, netbook, notebook, Ultrabook, tablet, Mac, or mobile phone. You might be single, married, or have ten kids. Either way, you probably have at least one, if not six or more, devices requiring comprehensive security. My family of four has 12 devices, all of which I do my best to Read more…

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Safe Banking On Your Mobile Device

Wednesday, January 11, 2012 at 6:00am by Robert Siciliano
Robert Siciliano

Mobile banking has experienced rapid growth over the last three years, in the U.S., more than doubling from 5% of online adults in 2007 to 12% by June 2010. Furthermore, Forrester predicts that one in five–or 50 million–U.S. adults will be using mobile banking by 2015. However, identity theft is a major concern and studies Read more…

Tags: , , , , , , , , , , ,

Friday Security Highlights: 5 New Year’s Resolutions for the Enterprise

Friday, January 6, 2012 at 11:49am by Brian Contos
Brian Contos

The New Year is always a time for looking back on the past, and more importantly, looking forward and reflecting on the positive changes we want or need to make in the coming year. McAfee predicts that 2012 will continue to see cybercriminals improving their toolkits in many areas that pose a material threat to Read more…

Tags: , , ,

Security Beyond the Desktop

Wednesday, January 4, 2012 at 2:44pm by Robert Siciliano
Robert Siciliano

A defensive posture no longer suffices for the protection of the devices and data that have become ubiquitous in today’s digital world. Rather than simply rushing to install defenses on computers, in networks, and in the cloud, we urgently need to step back and take a broader view of the security landscape, in order to Read more…

Tags: , , , , , , , , ,

Chaos Congress Peers Into Mobile Security, Protocols

Saturday, December 31, 2011 at 4:20pm by Jimmy Shah
Jimmy Shah

I heard a number of interesting mobile-related talks at the 28th Chaos Communications Congress (28c3) this week. Not every talk at the Congress was about newly discovered bugs or zero-day exploits; sometimes we got the building blocks necessary to better understand systems and increase security. I enjoyed key presentations on reverse-engineering USB 3G data sticks Read more…

Tags: , , ,

Fighting Mobile Phone Impersonation and Surveillance

Wednesday, December 28, 2011 at 9:56am by Jimmy Shah
Jimmy Shah

Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased a number of flaws and solutions in GSM mobile phone networks. Day 1 Defeating GSM encryption is not new. Nohl and Melette detailed how attackers can use known network control messages to help decrypt SMS Read more…

Tags: , ,

2012 Threats: Are You Ready?

Tuesday, December 27, 2011 at 10:13pm by Robert Siciliano
Robert Siciliano

History is said to be a good indicator of what might come in the future. If you follow trends in how things are done and what tends to gain momentum then you can get a pretty good idea of what’s ahead. McAfee Labs™ is made up of security professionals who spend all their waking hours Read more…

Tags: , , , , , , , , , , ,

Weekly Security Highlights: 2011 McAfee Security Journal Is A Must-Read For All

Monday, November 21, 2011 at 11:55am by Brian Contos
Brian Contos

As we move into our last (short) week before the Thanksgiving holiday, I’d like to take this chance to highlight some of the excellent work showcased our 2011 McAfee Security Journal, released this past Tuesday with articles compiled from McAfee Labs researchers and security industry thought leaders. The Journal was created as a venue to Read more…

Tags: , , , ,

For The Second Scam of Christmas, The Criminals Gave To Me… Malicious Mobile Apps!

Friday, November 18, 2011 at 1:44pm by Tracy Mooney
Tracy Mooney

…and Malicious codes ruining my mobile shopping spree! Back in March of this year I posted a blog entitled The Google Kill Switch and Smartphone tips. At the time there were 21 apps on Google Marketplace that were infected with Malware that Google yanked from the market faster than I could blog the warning call. Read more…

Tags: , , ,

The First Scam of Christmas, Criminals Gave To Me…Malicious Codes Ruining My Mobile Shopping Spree!

Thursday, November 17, 2011 at 1:39pm by Tracy Mooney
Tracy Mooney

The National Retail Federation did a survey that found that more than half of consumers will be using their Smartphone’s to shop this holiday season. I know I use mine all the time, from scanning items to find the best price and get reviews to using coupons on my phone. Having a Smartphone helps me Read more…

Tags: , , , ,