#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety Friday Security Highlights global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile malware mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity
The ShmooCon security conference takes place in Washington D.C. this weekend. There will be a good number of mobile and embedded talks, covering attacks on and defense of Bluetooth, Android, NFC, RFID, and more. Disposable computers A number of years ago at DefCon a team of penetration testers showed how to infiltrate a corporate network Read more…
Tags: Android, Bluetooth, iphone, mobile security, NFC, RFID, SchmooCon
Last year a friend had a bright idea for a party game that involved a series of QR codes in a circle on paper. He called it QR Code Roulette. Unlike the gambling game, selecting the right 2D barcode did not make you a winner. It turned out that every QR code contained a URL Read more…
Tags: Android, exploits, iphone, mobile malware
Apple users should be on the lookout for fake antivirus software and other malware targeting the Mac platform, McAfee warns While it used to be that Mac users felt somewhat insulated from the variety of malware threats circulating the web, cybercriminals have noted the growing popularity of Apple products and are now distributing malware aimed Read more…
Tags: Apple, consumer threat alert, fake anti-virus software, iPad, iphone, mac, malware
Today, McAfee released its first report focused on the current state of mobile security. The report, titled “Mobility and Security: Dazzling Opportunities, Profound Challenges,” was developed with Carnegie Mellon University to look at security from both the eyes of the senior IT professional and the general end users of mobile devices in the workplace. Key Read more…
Tags: Android, consumerization of IT, data loss, enterprise, iPad, iphone, Mobile, mobile security, smartphones
It’s always tough to get a ticket for Washington D.C.’s ShmooCon hacker conference. Just over 1,200 tickets were available in three rounds of ticket sales for the January 28-30 event. It’s a sign of the conference’s popularity that each round sold out in under 10 seconds. At about a third of the size of a larger conference like Read more…
Tags: Android, Cybercrime, exploits, iphone, malware, mobile security, online banking
The 27th Chaos Communications Congress (27C3), a computer security conference held in Berlin, has offered several good mobile and embedded security talks in the past few days. SMS-based vulnerabilities, vulnerabilities in mobile phone radios, and laptop rootkits that infect peripheral chips instead of the main CPU were among some of the new research presented. Day 1 Read more…
Tags: Android, iphone, mobile devices and security threats, mobile security
Jailbreaking your iOS device used to simply be about gaining some freedom–getting root access, installing native apps, and adding or modifying themes. The worst that could happen would be running into a slightly malicious installation package. Then we met the OSX/RRoll family of worms that actively went after jailbroken devices. Part of the risk came from insecure defaults Read more…
Tags: exploit, iphone, mobile devices and security threats, mobile security, vulnerability
In the last week there have been a few vulnerability disclosures for mobile web browsers. These threats affect a number of smart-phone platforms: Android (Google), WebOS (Palm), and iOS (Apple). Although all three platforms have their own apps and environments, it’s interesting that they’re all vulnerable through the same entry point of the mobile browser. Data stealing: Android Read more…
Tags: Android, iphone, mobile security, personal information over mobile phones, vulnerability, web security
Some of the most interesting research on mobile botnets is being done in the lab. Security researchers Collin Mulliner and Jean Pierre Seifert have put together a robust Proof-of-Concept (PoC) iPhone botnet. Their research was presented at the 5th International Conference on Malicious and Unwanted Software (MALWARE 2010) last week. In a presentation titled “Rise Read more…
Tags: Apple, botnets, Cybercrime, Data Protection, Endpoint Protection, iphone, Mobile, mobile security, research
Recently, I was sitting on the couch watching The Tonight Show when the couch suddenly began to vibrate. I immediately turned to my eldest cyber son and said, “Is that your phone buzzing.” But it wasn’t his phone. He reached into the couch cushions and pulled out his younger brother’s cell phone. Cyber son #2 had Read more…
Tags: cybermom, Family Safety, iPad, iphone, itouch, McAfee Family Protection
Posts tagged under iphone