$1 million guarantee access to live fraud resolution agents Acquisition Android botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime data breach Data Protection Dave DeWalt DLP Email & Web Security encryption Endpoint Protection enterprise facebook Family Safety global threat intelligence google government how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel kids online behavior lost wallet protection malware McAfee McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams security social networking social networks spam twitter vulnerability Web 2.0 work with victim restore identity
Have you ever bitten into an apple and found a worm? I have, and it’s yummy! Anyway, how many times have you heard, or even said, “I won’t get that computer virus because I have a Mac”? While Mac users tend to feel somewhat insulated from viruses, it’s time for anyone who owns an Apple Read more…
Tags: counter identity theft, Cybercrime, Data Protection, global threat intelligence, identity fraud scams, identity protection, identity protection $1 million guarantee, identity protection surveillance, identity surveillance, identity theft, identity theft expert, Identity thieves and cybercriminals, personal identity theft fraud, personal information protection
Let’s face it: Most people–even folks in the security industry–have a hard time explaining botnets (robot networks of infected computers) in a way that your Uncle Joe or Aunt Betty can understand. Is it really a big deal? Yes, it is. With the rapid growth in malware and bot infections we’re seeing, it’s important for Read more…
Tags: bot, botnet, Cybercrime, Data Protection, Endpoint Protection, facebook, global threat intelligence, identity protection, malware, social networking, spam, Web 2.0, zombie, zombie computers
Hi, everyone. I am very excited to announce that I recently joined McAfee Labs. As many of you know, I have spent more than 20 years doing anti-virus (AV) development and research. Needless to say, I am not happy to see the new developments in fake AV software. Fake AV developments began only a few Read more…
Tags: Apple, Cybercrime, Data Protection, Endpoint Protection, Fake AntiVirus, Family Safety, global threat intelligence, identity protection, identity theft, malware, OS/X
A couple of years ago a good friend phoned me in a panic – his car had been stolen. A major inconvenience admittedly but he managed to replace it, and there were no further attempts from the criminals to contact him in an attempt to get more of his possessions. The thing with the theft Read more…
Tags: Consumer, Cybercrime, Data Protection, enterprise, Family Safety, global threat intelligence, identity fraud, identity protection
With much fanfare and much to the chagrin of ne’er-do-wells far and wide, the Zeus Toolkit source code has been released to the public. This is notable because normally it would cost quite a bit to purchase the kit and associated services (in excess of of US$10,000). With a release of this sort, the most Read more…
Tags: counter identity theft, Cybercrime, global threat intelligence, malware, McAfee, McAfee Labs, Network Security, Risk and Compliance
Be wary of unsolicited emails and messages related to Osama bin Laden, McAfee warns Cyber scammers are using the high-profile news of Osama bin Laden’s death to distribute dangerous emails and messages related to the incident. So far, McAfee Labs™ has seen spam emails that claim to have confirmation of bin Laden’s death—or survival—as well Read more…
Tags: counter identity theft, Cybercrime, Data Protection, global threat intelligence, identity protection, identity theft, malware, social networking, spam
One of the most prevalent families of recent Trojans is called fake alerts. These Trojans generate fake warning screens that look like they were generated by legitimate security or anti-malware software. The majority of malware within this family attempts to con users by convincing them that their systems are at risk and that they should purchase Read more…
Tags: Apple, Cybercrime, Data Protection, Endpoint Protection, Family Safety, global threat intelligence, identity fraud, identity protection, identity theft, Mac OSX, malware, security
I suppose this was inevitable. The reported death of Osama Bin Laden is just too good a lure for cybercriminals and scammers to pass up. We at McAfee Labs certainly anticipated this and have been tracking it since the first reports came out of Washington early this morning. We have seen variations of what I Read more…
Tags: counter identity theft, Cybercrime, Data Protection, global threat intelligence, identity protection, identity theft, malware, social networking, spam
Working in the security industry brings about a myriad of challenges. This is especially true for vendors. We must do our best to educate and inform. At the same time, we want to avoid laying on the FUD–or scaring customers into making poorly educated security decisions. Which brings us to the recent LizaMoon attacks. There Read more…
Tags: enterprise, global threat intelligence, malware, McAfee, Network Security, Web 2.0
Having joined McAfee in October 2010, and being responsible for the EMEA region, I welcome you to my blog. Here I look to share with you not just two decades of experience in the technology industry, gained from my time at Juniper Networks and other technology companies, but also trends and insight from my travels Read more…
Tags: consumerization of IT, EMEA, enterprise, global threat intelligence, Mid-Market, Middle East, technology trends
Posts tagged under global threat intelligence