Feeds & Podcasts

Blogs

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety Friday Security Highlights global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile malware mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

Monthly Archives: January 2012

Growing Together in 2012

Tuesday, January 31, 2012 at 11:54am by Gavin Struthers
Gavin Struthers

On Jan. 26, I hosted my first Global Channel Partner Quarterly Town Hall Meeting. For those that joined thank you and please don’t hesitate to let me know how we could improve these sessions by providing a comment to this blog. If you didn’t have the opportunity to join the call, an on-demand recording can Read more…

Tags: , , , , , , , , , ,

Android Malware Continues To Be On The Rise, But Take Caution Before Jumping To Conclusions

Monday, January 30, 2012 at 9:35pm by David Marcus
David Marcus

In light of recent reports of malware surfacing on the Android Market, McAfee has compiled tips and education on the reality of mobile malware threats. A third quarter 2011 security report revealed that malware targeted toward Android smartphones continues to be on the rise, with the Android OS solidifying its lead as the primary target Read more…

Tags: , , , , , ,

IT Security: The Final Frontier?

Monday, January 30, 2012 at 11:24am by Leon Erlanger
Leon Erlanger

For anyone who has spent the past 10 years thinking IT security is all about operating systems, software, and the Internet, it’s a little shocking to read McAfee’s IT Security predictions for 2012. McAfee doesn’t spend a lot of text discussing new threats to the usual suspects. Instead, it zooms into the next frontier, where Read more…

Tags: ,

Weekly Security Highlights: 2011 Security Connected Recap

Monday, January 30, 2012 at 10:45am by Brian Contos
Brian Contos

The first month of 2012 has come to an end, but that doesn’t mean we get to forget all of the lessons we’ve learned over the past year. Here’s a recap of some of the most well received Security Connected posts of 2011, from best practices advice to security conference highlights: Building a Better Shady Read more…

Tags:

Data Privacy Day 2012

Friday, January 27, 2012 at 4:34pm by Robert Siciliano
Robert Siciliano

Lately, it seems that barely a day goes by when we don’t learn about a major Internet presence taking steps to further erode users’ privacy. The companies with access to our data are tracking us in ways that make Big Brother look like a sweet little baby sister. Typically when we hear an outcry about Read more…

Tags: , , , , , , , , , , , ,

6 Trends for 2012: @McAfeeBusiness January #SecChat Recap

Friday, January 27, 2012 at 9:19am by Brian Contos
Brian Contos

With the McAfee Labs’ 2012 predictions report as a guide, we started off this month’s #SecChat by crowdsourcing the question to our participants: what did the security community believe would be the most influential threats of 2012? We received a wide variety of speculations and well thought-out arguments, and we’ve collected what we hope is Read more…

Tags: ,

Smartphone and Tablet Users: You Need Security

Friday, January 27, 2012 at 3:30am by Robert Siciliano
Robert Siciliano

Care about preserving privacy and protecting against financial fraud, identity theft and viruses? With vast amounts of personal and business data now found on Android, BlackBerry, Windows and Symbian smartphones and tablets, mobile security threats continue to increase and threaten this information. According to a recent Nielsen report, a majority of smartphone owners (62%) have Read more…

Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

McAfee Threat Prediction For 2012—Are You Prepared To Face The Online Dangers?

Friday, January 27, 2012 at 2:42am by Anindita Mishra
Anindita Mishra

I am one of those who diligently makes plans every New Year to up the comfort and safety levels of the family. I spend many happy hours planning out changes in furniture; make a list of things that either need to be replaced or repaired or bought. It gives me a sense of achievement that Read more…

Tags: , ,

SchmooCon to Cover Hot Mobile Security Topics

Thursday, January 26, 2012 at 9:32am by Jimmy Shah
Jimmy Shah

The ShmooCon security conference takes place in Washington D.C. this weekend. There will be a good number of mobile and embedded talks, covering attacks on and defense of Bluetooth, Android, NFC, RFID, and more. Disposable computers A number of years ago at DefCon a team of penetration testers showed how to infiltrate a corporate network Read more…

Tags: , , , , , ,

Using DLP to Categorize Your Data and Reduce Risk

Wednesday, January 25, 2012 at 4:41pm by Nikfar Khaleeli
Nikfar Khaleeli

Data classification is an important – and very challenging – problem. It is all about tagging your data so that it can be found quickly and efficiently.  It is part of the Information Lifecycle Management process and enables organizations answer the following questions. What data types are available? Where are certain data located? What access Read more…

Tags: , , ,