Feeds & Podcasts

Blogs

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety Friday Security Highlights global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile malware mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

iphone

Posts tagged under iphone

SchmooCon to Cover Hot Mobile Security Topics

Thursday, January 26, 2012 at 9:32am by Jimmy Shah
Jimmy Shah

The ShmooCon security conference takes place in Washington D.C. this weekend. There will be a good number of mobile and embedded talks, covering attacks on and defense of Bluetooth, Android, NFC, RFID, and more. Disposable computers A number of years ago at DefCon a team of penetration testers showed how to infiltrate a corporate network Read more…

Tags: , , , , , ,

No Winners at QR Code Roulette

Wednesday, October 5, 2011 at 3:57pm by Jimmy Shah
Jimmy Shah

Last year a friend had a bright idea for a party game that involved a series of QR codes in a circle on paper. He called it QR Code Roulette. Unlike the gambling game, selecting the right 2D barcode did not make you a winner. It turned out that every QR code contained a URL Read more…

Tags: , , ,

Mac Users Face Growing Malware Threats

Friday, May 27, 2011 at 12:34pm by Consumer Threat Alerts
Consumer Threat Alerts

Apple users should be on the lookout for fake antivirus software and other malware targeting the Mac platform, McAfee warns While it used to be that Mac users felt somewhat insulated from the variety of malware threats circulating the web, cybercriminals have noted the growing popularity of Apple products and are now distributing malware aimed Read more…

Tags: , , , , , ,

The State Of Mobile Security—New Report From McAfee And Carnegie Mellon University

Tuesday, May 24, 2011 at 10:39am by David Goldschlag
David Goldschlag

Today, McAfee released its first report focused on the current state of mobile security. The report, titled “Mobility and Security: Dazzling Opportunities, Profound Challenges,” was developed with Carnegie Mellon University to look at security from both the eyes of the senior IT professional and the general end users of mobile devices in the workplace. Key Read more…

Tags: , , , , , , , ,

A ShmooCon Preview

Wednesday, January 19, 2011 at 8:00am by Jimmy Shah
Jimmy Shah

It’s always tough to get a ticket for Washington D.C.’s ShmooCon hacker conference. Just over 1,200 tickets were available in three rounds of ticket sales for the January 28-30 event. It’s a sign of the conference’s popularity that each round sold out in under 10 seconds. At about a third of the size of a larger conference like Read more…

Tags: , , , , , ,

27th Chaos Communications Congress: Mobile Security and More

Thursday, December 30, 2010 at 10:46am by Jimmy Shah
Jimmy Shah

The 27th Chaos Communications Congress (27C3), a computer security conference held in Berlin, has offered several good mobile and embedded security talks in the past few days. SMS-based vulnerabilities, vulnerabilities in mobile phone radios, and laptop rootkits that infect peripheral chips instead of the main CPU were among some of the new research presented. Day 1 Read more…

Tags: , , ,

‘Antid0te’ Coming to Boost Security for Jailbroken iPhones

Monday, December 13, 2010 at 12:25pm by Jimmy Shah
Jimmy Shah

Jailbreaking your iOS device used to simply be about gaining some freedom–getting root access, installing native apps, and adding or modifying themes. The worst that could happen would be running into a slightly malicious installation package. Then we met the OSX/RRoll family of worms that actively went after jailbroken devices. Part of the risk came from insecure defaults Read more…

Tags: , , , ,

Mobile Browsers: Trouble Comes in Threes

Tuesday, November 30, 2010 at 2:52am by Jimmy Shah
Jimmy Shah

In the last week there have been a few vulnerability disclosures for mobile web browsers. These threats affect a number of smart-phone platforms: Android (Google), WebOS (Palm), and iOS (Apple). Although all three platforms have their own apps and environments, it’s interesting that they’re all vulnerable through the same entry point of the mobile browser. Data stealing: Android Read more…

Tags: , , , , ,

iBots? Mobile phone network 0wnage

Thursday, October 28, 2010 at 12:53pm by Jimmy Shah
Jimmy Shah

Some of the most interesting research on mobile botnets is being done in the lab.  Security researchers Collin Mulliner and Jean Pierre Seifert have put together a robust Proof-of-Concept (PoC) iPhone botnet. Their research was presented at the 5th International Conference on Malicious and Unwanted Software (MALWARE 2010) last week.  In a presentation titled “Rise Read more…

Tags: , , , , , , , ,

A New, Cool “Protection” Tool for Your Kid’s Apple Device

Tuesday, June 22, 2010 at 4:56pm by Tracy Mooney
Tracy Mooney

Recently, I was sitting on the couch watching The Tonight Show when the couch suddenly began to vibrate.  I immediately turned to my eldest cyber son and said, “Is that your phone buzzing.” But it wasn’t his phone.  He reached into the couch cushions and pulled out his younger brother’s cell phone.  Cyber son #2 had Read more…

Tags: , , , , ,