$1 million guarantee access to live fraud resolution agents Acquisition Android botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime data breach Data Protection Dave DeWalt DLP Email & Web Security encryption Endpoint Protection enterprise facebook Family Safety global threat intelligence google government how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel kids online behavior lost wallet protection malware McAfee McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam security social networking social networks spam twitter vulnerability Web 2.0 work with victim restore identity
Have you ever gone up to an ATM machine and felt like something seemed “off”? I always thought that was complete paranoia on my part, however, criminals can be pretty savvy about getting your card number and pin. I used to think that I simply needed to cover my hand as I typed in my Read more…
Tags: ATM skimming, bank fraud, online banking
Have you ever bitten into an apple and found a worm? I have, and it’s yummy! Anyway, how many times have you heard, or even said, “I won’t get that computer virus because I have a Mac”? While Mac users tend to feel somewhat insulated from viruses, it’s time for anyone who owns an Apple Read more…
Tags: counter identity theft, Cybercrime, Data Protection, global threat intelligence, identity fraud scams, identity protection, identity protection $1 million guarantee, identity protection surveillance, identity surveillance, identity theft, identity theft expert, Identity thieves and cybercriminals, personal identity theft fraud, personal information protection
In a recent post on Security Week, Dave Anderson discussed what IT Security officials could learn from Super Bowl Security. According to Anderson, Super Bowl officials take two full years to plan and implement their strategy – something IT security pros should emulate when it comes to planning and executing their own security strategies for Read more…
Tags: enterprise security, Gartner Security and Risk Management Summit, McAfee Security Management
The federal government plans to shut 40 percent of its computer centers over the next four years to reduce its hefty technology budget and modernize the way it uses computers to manage data and provide services to citizens. It is a part of the strategy outlined in a memo from March last year to Federal agencies, which Read more…
Tags: cloud, consolidation, data center, data center security, enterprise, security optimization
I was having a conversation the other day with a friend of mine about Google+. I have only been on Google+ a little over a week, but I definitely have formed some opinions about this fledgling social network. My friend suggested that Google may make it a bit easier to post to only friends as Read more…
Tags: email accounts, email security, google, privacy setting, social networking
A new weekly blog post (introduced last week) for McAfee partners which highlights news and information from the previous week. Wow talk about a red carpet welcome…Intel reports 5th consecutive quarter of record revenue. Q2 Comment from Otellini: “It was a second quarter record for McAfee in terms of revenue.” Intel’s worldwide channels Read more…
Tags: Alex Thurber, channel partner, Channel Partners, Focus11, Paul Otellini
To all you security companies out there, listen up: “identity theft protection” has become an overused and abused marketing term, which is often used to sell a product or service that doesn’t actually protect users from identity theft. It’s like labeling food “natural” when we know it’s not “organic.” It’s incorrect at best and a Read more…
Tags: counter identity theft, credit card fraud and protection, credit monitoring and resolution, data breach, identity fraud, identity fraud scams, identity protection, identity protection $1 million guarantee, identity protection surveillance, identity surveillance, identity theft, identity theft expert, Identity thieves and cybercriminals, lost wallet protection, McAfee, McAfee Identity Protection, personal identity theft fraud, personal information protection, proactive identity protection, proactive identity surveillance
Let’s face it. Kids will be kids and they will demand what their friends get (those spoiled kids seem to have millionaire parents who delight in buying them the latest gadgets). And so parents like me are badgered day and night for a wee little smartphone, so small and sleek, and yet so full of Read more…
Tags: how to talk to kids, how to talk to teens, McAfee Mobile Security, mcafee wavesecure, mobile security, teens online safety
Sometimes progress can be scary. It was 1986. I was a legal intern at Merrill Lynch working my way through college. At that time, there was no public Internet – and desktop PCs were uncommon in the workplace. In fact, most of the tasks that were performed by my team in the legal department were Read more…
Tags: cloud, cloud security
Cyber Security Conferences have been around almost as long as Cyber Security itself, but are they worth attending? During this month’s #SecChat, Thursday, July 28 at 11am PT, we want you to sound off and make yourself heard regarding our industry’s mass of mainstream and “hacker” security events. We want to know what you, as Read more…
Tags: #SecChat, Blackhat, DefCon, enterprise, Interop, OWASP, RSA, SecTor, security conferences