With some predictions of “self driving cars” being available to consumers as early as 2018, the rapid adoption of technology into the basics of driving is posing some interesting challenges from a security standpoint. In a recent TV news report, Closer Look: Newer Cars May Pose Hacking Risk, McAfee’s Brian Contos discusses some of these Read more…
Tags: Eelectric Vehicle, embedded, EV, HV, Hybrid Vehicle, In vehicle Infotainment, malware, security
Wireless communication is inherently insecure. My consulting experience has confirmed that some organizations understand this fact when connecting to wireless networks with their laptops. However, their awareness falters when connecting their mobile devices to the same networks. According to a Echoworx study, 44% of the surveyed audience at London’s Infosecurity Europe 2011 conference transmitted sensitive Read more…
It’s no surprise that smartphones and tablets are changing the way people are interacting not only online, but also in every day life. New ways of shopping, reading books, watching TV, communicating with colleagues, family and friends, banking, and even managing one’s health are all made possible with these powerful mobile devices. Ubiquitous computing with Read more…
Tags: antivirus, McAfee, Mobile, mobile security, security, smartphones, tablets
In my last post we discussed the most dangerous kind of vulnerabilities that we classify at McAfee Labs: remote code execution and denial of service. Today, we’ll talk about vulnerabilities that are not so dangerous, those we classify as Medium or Low Risk. These threats still require our attention because they can create a chain Read more…
Tags: attack, malware, security, Security 101, vulnerability
Welcome back to Security 101. The topic of today’s blog is vulnerabilities. In our frequent McAfee Labs Threat Advisories you see the term vulnerability in almost every item. “A vulnerability has been found…” or “A vulnerability in some versions of…” are commonplace. What is a vulnerability? A vulnerability is a program bug that under certain Read more…
Tags: attack, malware, security, Security 101, vulnerability
Have you seen headlines like these lately?: “Skimmer Siphoning Card Data at the Gas Pump” or “Restaurants Sue Vendors After Point-of-Sale Hack.” How about “Insulin Pump Hack Exposes Medical Device Danger” or “Stunex Computer Worm has Vast Repercussions”? ATMs, point-of-sale (POS) terminals, kiosks, medical equipment, SCADA systems and other embedded devices are being hacked in ever-increasing Read more…
Tags: anti-virus, ATM scams, devices, embedded, hacking, security
When I started working at McAfee, I noticed that many of the terms commonly used here were completely unknown to me. Fortunately I had no problems understanding them, but I’m sure that more than one person has read a McAfee security update and thought “What does this mean?” This question is more likely when a Read more…
Tags: attacks, malware, security, Security 101, vulnerability
McAfee Security Certification Program Today, McAfee is excited to announce the addition of two new exams and certifications to our McAfee Security Certification Program. We launched the program back in January with two initial assessments, promising to add to our curriculum as time went on. The two new certifications, McAfee Certified Product Specialist – Network Read more…
Tags: certification, enterprise, security
Data centers have been going through a lot of changes. In the past, it wasn’t unusual to see an organization with dozens or even hundreds of data centers spread out all over the world. As the physical environment of these data centers have become more complicated, there has been a trend towards consolidation in order Read more…
Tags: Consumer, data, data center, data loss, enterprise, security, security breach
If we look at the evolution of hacking, certain techniques never go out of style, but we’re at the beginning of a big shift in terms of the targets. The threat landscape has evolved beyond PCs, tablets, and smartphones to a whole new battleground: connected devices all around us. According to Ericsson, there will be Read more…
Tags: black hat hackers, cyber attack, embedded, Hacking Exposed, Risk and Compliance, security, white hat hackers
Posts tagged under security