#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety Friday Security Highlights global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile malware mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity
There has been a lot of talk in the news lately about privacy settings. Facebook, Verizon and even Etsy have all been making changes to their Privacy Settings. With all this talk about privacy settings, I think it is easy for people’s eyes to glaze over them or throw their hands up and say “I give Read more…
Tags: Consumer, cybermom, facebook, Facebook Security, privacy, privacy setting, privacy settings
I recently performed a penetration test of a transportation company in the Midwest. Save for a few low-severity vulnerabilities, Company X had a well-managed public-facing network infrastructure. Satisfied with the status of their network security, I turned my attention to the human network. Searching for Company X on sites like Twitter, Facebook, and LinkedIn, I Read more…
Tags: enterprise, Information Security, privacy, social media
An interesting story broke this week on BBC News and other sites regarding the Association of Internet Community Services (ASIC) in France starting a legal challenge against a new French law passed on March 1, 2011, the “Decree on the conservation of data”, which insists on the preservation and tracking of online activity. The LCEN Read more…
Tags: ASIC, Data Protection, France, France Law, French Law, LCEN, privacy
Looking at computer threats from quarter to quarter remains a busy experience for us at McAfee Labs. Through the first three quarters of the year we have analyzed and cataloged more threats than in all other years combined, and the growth in both volume and sophistication of malware and attacks shows no signs of slowing. Read more…
Tags: botnet, critical infrastructure, Cybercrime, data breach, Data Protection, Email & Web Security, encryption, Endpoint Protection, facebook, global threat intelligence, Hacktivism, malware, Mobile, Operation Aurora, phishing, privacy, seo abuse, social networking, social networks, spam, sql attacks, Stuxnet, twitter, vulnerability, Web 2.0, zeus
The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to our fourth annual Mapping the Mal Web report released today. A staggering fifty-six percent of all risky sites end in .COM! Researcher at our very own McAfee Labs analyzed more than 27 million websites to uncover which domains are the most Read more…
Tags: Cybercrime, data breach, Data Protection, Family Safety, global threat intelligence, identity protection, malware, privacy, social networking, spam, Web 2.0
I read with great relish about the release of Firesheep over the weekend at ToorCon. Firesheep, written by Eric Butler, is a FireFox plugin that allows for the capturing of “insecure” login information. From the Firesheep website: “When logging into a website you usually start by submitting your username and password. The server then checks Read more…
Tags: Cybercrime, Data Protection, EFF, encryption, Endpoint Protection, facebook, google, identity protection, malware, phishing, privacy, social networking, social networks, twitter, Web 2.0
Following on from a failed state-wide “hack” of the Blackberry system, where the state-controlled telco etisalat tried to distribute a “performance enhancing patch” to Blackberry users (which turned out to be a state-controlled back door program), The United Arab Emirates is threatening to block e-mail sending and IM delivery on Blackberries, and Saudi Arabia is threatening to Read more…
Tags: Data Protection, privacy, Saudi Arabia, UAE, United Arab Emirates
Geolocation presents new nightmares about protecting data.
Tags: Data Protection, mobile security, privacy, smartphones
Although maybe unnoticed, a month ago Missouri finally joined that heady club called “states which have Data Privacy Laws.” On 28th August, the “Missouri Data Breach Notification Law,” or House Bill 62 took effect, not protecting, but at least enforcing care and attention of residents personal information (Social Security Numbers, Driver’s Licence Numbers, and information Read more…
Tags: data breach, Data Protection, privacy, regulations, Risk and Compliance
With the forthcoming release of Windows 7, questions about “Bitlocker” are coming up again. For those of you who were around during the original release of Bitlocker, or as it was known then “Secure Startup,” you’ll remember that it was meant to completely eliminate the necessity for third party security software. Yes, Bitlocker was going Read more…
Tags: Compliance, Data Protection, encryption, privacy
Posts tagged under privacy