Feeds & Podcasts

Archive

Blogs

Tags

$1 million guarantee access to live fraud resolution agents Acquisition Android botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime data breach Data Protection Dave DeWalt DLP Email & Web Security encryption Endpoint Protection enterprise facebook Family Safety global threat intelligence google government how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel kids online behavior lost wallet protection malware McAfee McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam security social networking social networks spam twitter vulnerability Web 2.0 work with victim restore identity

critical infrastructure

Posts tagged under critical infrastructure

Commerce Cyber Plan: A Part of the Solution

Thursday, June 9, 2011 at 6:19pm by Tom Gann
Tom Gann

It is no secret the critical infrastructure of the United States is under cyber attack – every second of every day – from a threat that continues to evolve over time. And it isn’t slowing down – this past quarter, McAfee announced that malware had its highest growth rate on record. We face a dangerous Read more…

Tags: , , , , ,

India’s Improvements To Cybersecurity

Tuesday, April 26, 2011 at 8:41am by Pamela Warren
Pamela Warren

I just returned from a trip to New Delhi where I met with several government agencies and organizations working hard to secure India’s government and businesses. India is an incredibly important country as part of our global economy and around the world, as we clearly rely on India for a great deal of services today. It Read more…

Tags: , , ,

Is A New Virus Hitting In Iran?

Monday, April 25, 2011 at 4:05pm by Joris Evers
Joris Evers

The Iranian government on Monday said it was targeted by a new computer virus dubbed “Stars.” The report came from the director of Iran’s Passive Defense Organization through the country’s Mehr News Agency. Global media subsequently picked up the story, which has now been covered by the Associated Press, BBC, Reuters and many others. Stars would Read more…

Tags: , , , ,

Critical Infrastructure Not Ready For Cyberattacks

Wednesday, April 20, 2011 at 12:38pm by George Kurtz
George Kurtz

On Tuesday, McAfee and CSIS issued our second annual critical infrastructure report, “In the Dark: Crucial Industries Confront Cyberattacks.” The good news? We took a close look at the sectors that affect you on a daily basis—power, oil, gas, and water—sectors that may well be the first targets of a serious cyberattack. The bad news? Read more…

Tags: , ,

New release of CIP report: Crucial Industries Confront Cyber Attacks

Wednesday, April 20, 2011 at 11:51am by Brian Contos
Brian Contos

Yesterday, McAfee released “In the Dark: Crucial Industries Confront Cyberattacks,” a sequel report focused on the critical civilian infrastructure that depends most heavily on industrial control systems. Our 2011 report is a follow up to last year’s “In the Crossfire: Critical Infrastructure in the Age of Cyberwar“. As our VP of Threat Intelligence Phyllis Schneck Read more…

Tags: , , ,

In the Dark: Crucial Industries Confront Cyberattacks

Tuesday, April 19, 2011 at 6:05am by Phyllis Schneck
Phyllis Schneck

Decades ago when the early communications networks were formed, scientists rallied around the joy of sending data at light speed and happily connected once-disparate networks together to create the early stages of the “Internet.”  This capability eventually enabled conversations, money transfers, massive data sharing, and the confluence of convenience and efficiencies unlike any the world Read more…

Tags: , , , ,

Evangelizing The Importance Of Control System Security

Thursday, April 14, 2011 at 11:07am by David Hatchell
David Hatchell

Recently we announced that Siemens Industry Automation Division had certified McAfee Application Control as interoperable with its product line which includes the Simatic WINCC SCADA system which was targeted by Stuxnet. This is an important announcement which underscores the intersection of the process control system world and the traditional IT security world which have for Read more…

Tags: ,

Safeguarding Against Advanced Persistent Threats

Wednesday, April 6, 2011 at 11:25am by Stuart McClure
Stuart McClure

Advanced persistent threats like we’ve seen with Stuxnet and Night Dragon target the manufacturing and process industry, including national critical infrastructure.  The industrial revolution started our reliance on automation. However as the industry became more integrated, modular and adaptable to broader industrial processing it also grew more vulnerable and susceptible to attack. Adding further complication Read more…

Tags: , , ,

Industry-Government Collaboration: Our Best Defense

Wednesday, March 16, 2011 at 6:21pm by Phyllis Schneck
Phyllis Schneck

I had the privilege of speaking before the House Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies at a hearing titled “Examining the Cyber Threat to Critical Infrastructure and the American Economy.” I was pleased to have the opportunity to provide McAfee’s perspective on the threats that face our nation’s infrastructure, as well as provide Read more…

Tags: , , , , , , ,

Highlights of CanSecWest Day 2:

Hacks Both Common and Sublime

Friday, March 11, 2011 at 1:24pm by David Marcus
David Marcus

Another day has passed here at CanSecWest with a mixed bag of results. Overall the content was, again, quite good, PWN2OWN shows us the future, HallCon and BarCon were all kinds of awesome, and I had two distinct “a ha!” moments. My first “a ha!” came during DongJoo Ha and KiChan Ahn’s “Is Your Gaming Read more…

Tags: , , , , , , , , , ,