Feeds & Podcasts

Blogs

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

Operation Aurora

Posts tagged under Operation Aurora

The New Reality of Stealth Crimeware

Monday, June 20, 2011 at 4:38pm by David Marcus
David Marcus

Anyone who has been in information security recently knows that it has gotten easier for cybercriminals to build stealth crimeware. The malware we deal with on a regular basis grows ever more difficult to find, while high-end targeted attacks such as Stuxnet and other advanced persistent threats (APTs, the abbreviation I hate) are using ever Read more…

Tags: , , , , , , , , , , , , ,

Lockheed Martin, EMC, Sony: Design Inner Security Layer assuming Outer Layer is already breached.

Thursday, June 2, 2011 at 6:28pm by Vijay Upadhyaya
Vijay Upadhyaya

The recent security breach at Lockheed Martin confirmed that the attacks we saw with Operation Aurora, identified by McAfee, and Stuxnet are just the beginning of a new era of targeted attacks. Cybercriminals are now executing the perfect plan to get closer to their target without raising any red flags. In the case of Operation Read more…

Tags: , , , , , , ,

Google Disclosure Spotlights Phishing Scams

Thursday, June 2, 2011 at 10:13am by Joris Evers
Joris Evers

Google’s unusual disclosure on Wednesday that e-mail accounts of prominent Gmail users had been compromised puts the spotlight on a very common online scam: phishing scams. Phishing is a way of persuading Internet users to give up sensitive information such as usernames, passwords and credit card details. The scammers masquerade as a trustworthy entity in Read more…

Tags: , , , ,

Defense In Depth: Protecting From The Inside Out

Friday, March 25, 2011 at 9:48am by Stuart McClure
Stuart McClure

Something Changed With Aurora Even before the China centered Operation Aurora attack (a.k.a. Google attacks) in which hackers broke into numerous high-profile organizations in the US to steal highly confidential information, I had been warning customers (and anyone in ear shot quite frankly) of the most effective strategies to protect against the deluge of advanced Read more…

Tags: , , , , , , ,

Industry-Government Collaboration: Our Best Defense

Wednesday, March 16, 2011 at 6:21pm by Dr. Phyllis Schneck
Dr. Phyllis Schneck

I had the privilege of speaking before the House Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies at a hearing titled “Examining the Cyber Threat to Critical Infrastructure and the American Economy.” I was pleased to have the opportunity to provide McAfee’s perspective on the threats that face our nation’s infrastructure, as well as provide Read more…

Tags: , , , , , , ,

Global Energy Industry Hit In “Night Dragon” Attacks

Wednesday, February 9, 2011 at 9:18pm by George Kurtz
George Kurtz

In 2010 McAfee Labs processed an average of almost 55,000 pieces of new malware every day. That nearly mind-numbing amount makes it difficult for any particular attack to stand out. Today, however, I want to highlight one large scale attack that is a clear example of how cybercrime has evolved from something of a hobbyist Read more…

Tags: , , , , , ,

Moving Forward, Looking Back

Friday, January 28, 2011 at 12:12pm by Tom Conway
Tom Conway

The New Year is already in full swing and as always, we at McAfee are working hard to anticipate and prepare our customers for potential threats. The year 2010 had many major cybersecurity incidents, including Operation Aurora and the Stuxnet virus, showing the sophisticated ways in which dangerous people seek to exploit information systems. These incidents Read more…

Tags: , , , , , , , ,

Cybercrime, Hacktivism, Cyberterrorism Hot Topics at McAfee’s Focus10

Thursday, November 18, 2010 at 3:20pm by David Marcus
David Marcus

Yesterday I presented on Cybercrime, Hacktivism and Cyberterrorism with one of McAfee Labs’ most senior and well respected researchers, Francois Paget. This was a very different session in a number of ways. First, of all it was completely unrelated to product or technology–there really are no Anti-Hacktivism or Anti-Cyberterrorism plug-ins. OK, cybercrime takes many threat Read more…

Tags: , , , , , , , , ,

Malware Rises, Zeus Goes Mobile, Stuxnet Confuses in Recent Quarter

Thursday, November 18, 2010 at 3:19pm by David Marcus
David Marcus

Looking at computer threats from quarter to quarter remains a busy experience for us at McAfee Labs. Through the first three quarters of the year we have analyzed and cataloged more threats than in all other years combined, and the growth in both volume and sophistication of malware and attacks shows no signs of slowing. Read more…

Tags: , , , , , , , , , , , , , , , , , , , , , , , , ,

FOCUS 10: Predictive Detection to Cyberterrorism

Wednesday, October 20, 2010 at 9:52am by Francois Paget
Francois Paget

McAfee just hosted its third FOCUS security conference in Las Vegas. I greatly enjoyed the 2008 and 2009 events, and I’ve just returned from the 2010 conference. Of course, I did not miss the keynotes sessions from our CEO Dave DeWalt and President Bill Clinton. Both were excellent: Our boss explained the “McAfee 3.0” strategy Read more…

Tags: , , , , , , , , , , , ,