#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity
Happy New Year everyone! Since I am about to take a few days off to spend with my family, I thought for this blog I would share some of my favorite holiday sites. For New Years Eve, I found this site that lets you view webcams from New Years celebrations around the world. My friend Read more…
Tags: holiday websites
With a Russian Gang
The recent WikiLeaks disclosure of more than 250,000 U.S. State Department diplomatic cables got people worked up. Running opposite much public opinion, the main WikiLeaks defender in the hacktivism field is the “Anonymous” group. After earlier engaging in various cyberdemonstrations against copyright-protection societies, Anonymous is now fully involved in a battle against WikiLeaks’ censors and Read more…
Tags: Cybercrime, Hacktivism
The 27th Chaos Communications Congress (27C3), a computer security conference held in Berlin, has offered several good mobile and embedded security talks in the past few days. SMS-based vulnerabilities, vulnerabilities in mobile phone radios, and laptop rootkits that infect peripheral chips instead of the main CPU were among some of the new research presented. Day 1 Read more…
Tags: Android, iphone, mobile devices and security threats, mobile security
The Nigerian 419 Scam is a form of advance-fee fraud, a confidence trick in which the target is persuaded to advance sums of money in the hope of realizing a significantly larger gain. “419″ refers to the article of the Nigerian Criminal Code that deals with fraud. Almost everyone has been targeted by this type Read more…
Talking to teens about cyberbullying is a different story. If you have a teen and haven’t already been discussing online safety, you should start. If my teens are any example of the “typical” teen, they already know everything there is to know about the Internet and don’t need me teaching them anything about online safety! Read more…
Tags: cyberbullying, how to talk to kids, how to talk to teens
How much? It’s a simple question really, and one that I know the security professional often finds very difficult to answer when trying to justify mitigating risks to business. I mean what exactly is the financial impact of a virus outbreak? Or can you calculate how much the bottom line would be affected if that laptop Read more…
Tags: Cybercrime, Data Protection, enterprise
Our inaugural #SecChat in November raised questions on securing PHI, while our December discussion turned to the buzz and security debate around the recent Wikileaks saga. The conversation was certainly heated, with 70 contributors tuning in for the chat and 466 tweets with the #SecChat hashtag. When it comes to Wikileaks, there’s a lot to Read more…
Tags: Data Protection, DLP, enterprise, Mid-Market, security, wikileaks
During FOCUS10, we announced our Security Connected initiative as a way to get the enterprise one step ahead, breaking down the silos of security technology and processes. In January, we’ll dissect all the elements of Security Connected here on the blog. As an introduction to this series, we thought we’d remind you of the surefire Read more…
Tags: Data Protection, enterprise, Mid-Market, Network Security, Risk and Compliance, security, Security Connected
The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives. Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels, airports, cars, and even airplanes. The mobility factor allows us to work anytime, anywhere, on numerous devices. “Being connected” is at an all-time Read more…
Tags: Firesheep, identity theft expert, internet identity trading surveillance, mobile wireless internet security concerns, personal identity theft fraud, sniffing tools, unsecured unprotected wireless, unsecured unprotected wireless security risks, Wi-Fi WEP WAP protection breach
The second Tuesday of every month (“Patch Tuesday”) is a very busy day for information security warriors. They have to digest a flood of information from affected vendors (primarily Microsoft and Adobe) and then cross-check and correlate that against whatever their security vendors say. They have to take into account their actual environments, the assets and resources Read more…