Feeds & Podcasts

Archive

Blogs

Tags

$1 million guarantee access to live fraud resolution agents Acquisition Android botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime data breach Data Protection Dave DeWalt DLP Email & Web Security encryption Endpoint Protection enterprise facebook Family Safety global threat intelligence google government how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel kids online behavior lost wallet protection malware McAfee McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam security social networking social networks spam twitter vulnerability Web 2.0 work with victim restore identity

Data Protection

Posts tagged under Data Protection

Bill Would Remove Social Security Numbers From Medicare Cards

Wednesday, August 10, 2011 at 2:50pm by Robert Siciliano
Robert Siciliano

The most basic advice for protecting your own identity is to protect your Social Security number. The obvious solution is simply never to disclose your number, but this is silly, since, depending on your age, you have probably provided it to hundreds of people, on hundreds of forms. It now sits in hundreds of databases, Read more…

Tags: , , , , , , , , , , , , , , , , , ,

Researchers Say Identity Theft Has Lasting Psychological Effects

Tuesday, August 9, 2011 at 11:39am by Robert Siciliano
Robert Siciliano

Identity theft victims don’t need Jessica Van Vliet, an assistant professor in counseling psychology at the University of Alberta, to tell them that they no longer feel safe when conducting everyday financial transactions, which most of us take for granted. But she did a study highlighting a fact that many of us in the industry Read more…

Tags: , , , , , , , , , , , , , , , , , , ,

Online Gamers Risk Credit Card Fraud

Thursday, August 4, 2011 at 12:57pm by Robert Siciliano
Robert Siciliano

The Sony Corporation has been providing consumers with stellar electronics since before the introduction of the Walkman. The past six months have been harsher for Sony, with attacks by hacktivists and numerous breaches of clients’ data. Many recent breaches involved usernames, passwords, email addresses, and in some cases, credit card numbers. Each compromised data point Read more…

Tags: , , , , , , , , , , , , , ,

Myth: Apple Products Don’t Get Viruses

Friday, July 29, 2011 at 9:44am by Robert Siciliano
Robert Siciliano

Have you ever bitten into an apple and found a worm? I have, and it’s yummy! Anyway, how many times have you heard, or even said, “I won’t get that computer virus because I have a Mac”?  While Mac users tend to feel somewhat insulated from viruses, it’s time for anyone who owns an Apple Read more…

Tags: , , , , , , , , , , , , ,

McAfee Labs Releases “Fake Alert” Stinger

Monday, July 11, 2011 at 9:41am by David Marcus
David Marcus

McAfee Labs is pleased to announce the availability of our “Fake Alert” Stinger – an improved Stinger tool with aggressive generic content targeted at enhanced detection and remediation of fake alert based threats. In our efforts to provide the best of protection for our customers against rogue security products or fake alert type malware – Read more…

Tags: , , , , , , , ,

The New Reality of Stealth Crimeware

Monday, June 20, 2011 at 4:38pm by David Marcus
David Marcus

Anyone who has been in information security recently knows that it has gotten easier for cybercriminals to build stealth crimeware. The malware we deal with on a regular basis grows ever more difficult to find, while high-end targeted attacks such as Stuxnet and other advanced persistent threats (APTs, the abbreviation I hate) are using ever Read more…

Tags: , , , , , , , , , , , , ,

Mobile Device, Or Not? That Is The Question

Wednesday, June 8, 2011 at 1:59pm by Simon Hunt
Simon Hunt

For the last couple of weeks I’ve been presenting around the U.S. at events such as Secure360 in St. Paul, and the McAfee Executive Summits in Boston and New York. One question I was asked at every event, was “What is a mobile device?” The flippant answer of course which after two weeks of middle Read more…

Tags: , , , , ,

Google Disclosure Spotlights Phishing Scams

Thursday, June 2, 2011 at 10:13am by Joris Evers
Joris Evers

Google’s unusual disclosure on Wednesday that e-mail accounts of prominent Gmail users had been compromised puts the spotlight on a very common online scam: phishing scams. Phishing is a way of persuading Internet users to give up sensitive information such as usernames, passwords and credit card details. The scammers masquerade as a trustworthy entity in Read more…

Tags: , , , ,

Botnets Demystified and Simplified

Wednesday, June 1, 2011 at 10:26pm by David Marcus
David Marcus

Let’s face it: Most people–even folks in the security industry–have a hard time explaining botnets (robot networks of infected computers) in a way that your Uncle Joe or Aunt Betty can understand. Is it really a big deal? Yes, it is. With the rapid growth in malware and bot infections we’re seeing, it’s important for Read more…

Tags: , , , , , , , , , , , , ,

McAfee Labs Assists in Rare Cybercrime Conviction

Wednesday, June 1, 2011 at 10:28am by David Marcus
David Marcus

As we have discussed on this blog more than once, convictions for cybercrime activities are a rare thing indeed. Recently, however, a former University of Salford (United Kingdom) student was convicted and given a suspended sentence for stealing online gaming credentials. The University of Salford contacted the police after it received a complaint from a Read more…

Tags: , , , , , ,