Feeds & Podcasts

Blogs

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

Yearly Archives: 2010

Happy Holidays!

Thursday, December 30, 2010 at 4:18pm by Tracy Mooney
Tracy Mooney

Happy New Year everyone! Since I am about to take a few days off to spend with my family, I thought for this blog I would share some of my favorite holiday sites. For New Years Eve, I found this site that lets you view webcams from New Years celebrations around the world. My friend Read more…

Tags:

Don’t Confuse ‘Anonymous’

With a Russian Gang

Thursday, December 30, 2010 at 1:11pm by Francois Paget
Francois Paget

The recent WikiLeaks disclosure of more than 250,000 U.S. State Department diplomatic cables got people worked up. Running opposite much public opinion, the main WikiLeaks defender in the hacktivism field is the “Anonymous” group. After earlier engaging in various cyberdemonstrations against copyright-protection societies, Anonymous is now fully involved in a battle against WikiLeaks’ censors and Read more…

Tags: ,

27th Chaos Communications Congress: Mobile Security and More

Thursday, December 30, 2010 at 10:46am by Jimmy Shah
Jimmy Shah

The 27th Chaos Communications Congress (27C3), a computer security conference held in Berlin, has offered several good mobile and embedded security talks in the past few days. SMS-based vulnerabilities, vulnerabilities in mobile phone radios, and laptop rootkits that infect peripheral chips instead of the main CPU were among some of the new research presented. Day 1 Read more…

Tags: , , ,

Inside The Nigerian 419 Scam

Wednesday, December 29, 2010 at 10:08am by Robert Siciliano
Robert Siciliano

The Nigerian 419 Scam is a form of advance-fee fraud, a confidence trick in which the target is persuaded to advance sums of money in the hope of realizing a significantly larger gain. “419″ refers to the article of the Nigerian Criminal Code that deals with fraud. Almost everyone has been targeted by this type Read more…

Tags: , ,

Cyberbullying Discussion: Talking to Your Teens

Tuesday, December 28, 2010 at 10:44am by Tracy Mooney
Tracy Mooney

Talking to teens about cyberbullying is a different story. If you have a teen and haven’t already been discussing online safety, you should start. If my teens are any example of the “typical” teen, they already know everything there is to know about the Internet and don’t need me teaching them anything about online safety! Read more…

Tags: , ,

Quantifying The Financial Impact Of Security Incidents

Thursday, December 23, 2010 at 11:01am by Raj Samani
Raj Samani

How much?  It’s a simple question really, and one that I know the security professional often finds very difficult to answer when trying to justify mitigating risks to business.  I mean what exactly is the financial impact of a virus outbreak?  Or can you calculate how much the bottom line would be affected if that laptop Read more…

Tags: , ,

Wikileaks #SecChat: Lessons for the Enterprise on Hacktivism

Thursday, December 23, 2010 at 9:49am by Brian Contos
Brian Contos

Our inaugural #SecChat in November raised questions on securing PHI, while our December discussion turned to the buzz and security debate around the recent Wikileaks saga. The conversation was certainly heated, with 70 contributors tuning in for the chat and 466 tweets with the #SecChat hashtag. When it comes to Wikileaks, there’s a lot to Read more…

Tags: , , , , ,

Dissecting Security Connected: 5 Ways to Get Hacked

Wednesday, December 22, 2010 at 10:26am by Brian Contos
Brian Contos

During FOCUS10, we announced our Security Connected initiative as a way to get the enterprise one step ahead, breaking down the silos of security technology and processes. In January, we’ll dissect all the elements of Security Connected here on the blog. As an introduction to this series, we thought we’d remind you of the surefire Read more…

Tags: , , , , , ,

Hacking Wireless for Identity Theft

Tuesday, December 21, 2010 at 1:23pm by Robert Siciliano
Robert Siciliano

The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives. Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels, airports, cars, and even airplanes. The mobility factor allows us to work anytime, anywhere, on numerous devices. “Being connected” is at an all-time Read more…

Tags: , , , , , , , ,

Making Sense of McAfee Risk Advisor

Tuesday, December 21, 2010 at 12:55pm by Jim Walter
Jim Walter

The second Tuesday of every month (“Patch Tuesday”) is a very busy day for information security warriors. They have to digest a flood of information from affected vendors (primarily Microsoft and Adobe) and then cross-check and correlate that against whatever their security vendors say. They have to take into account their actual environments, the assets and resources Read more…

Tags: , ,