Feeds & Podcasts

Corporate Blogs

Meet the Bloggers

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety Friday Security Highlights global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel internet security iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile malware mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

CTO

Read about the latest threats, partnerships, and innovations in the world of security from experts such as George Kurtz, Simon Hunt and Phyllis Schneck. Armed with decades of experience in the security industry, the authors of this blog analyze current technology issues and define the terms and techniques required to resolve them.

Posts in CTO

Security Precautions and Best Practices for ANY Border Crossing

Monday, February 13, 2012 at 11:24am by Simon Hunt
Simon Hunt

Recently, the New York Times wrote an article titled “Traveling Light in a Time of Digital Thievery.”  The article focused on China, and the precautions that some executives take when traveling to that country.  When I was approached to speak to the reporter for this story, I told her that I didn’t think it was Read more…

Evil Twitter… Finding malware amongst the maelstrom..

Tuesday, December 13, 2011 at 2:35pm by Simon Hunt
Simon Hunt

Would it surprise you to know that yesterday, more than 5000 tweets were posted with URLS which would have dropped you on sites which distribute malware? It was only a small portion of the total number of tweets containing URLs, around 2.5 million or so, and there were an additional ~200,000 that went to sites Read more…

Tags: , ,

15 Minutes With… Ben Andrew

Wednesday, November 9, 2011 at 9:54am by Simon Hunt
Simon Hunt

Welcome to “15 minutes with” – an occasional contribution between Simon Hunt, CTO Endpoint Security and the movers-and-shakers within McAfee’s technical community. This week on the stand is Ben Andrew, Senior Product Manager for Virtualization Security. So Ben, care to tell us how long you’ve been with McAfee, and what you’ve been involved in? Hi Read more…

15 Minutes with… David O’Berry

Tuesday, September 27, 2011 at 3:05pm by Simon Hunt
Simon Hunt

Welcome to “15 minutes with” – an occasional contribution between myself and the movers-and-shakers within McAfee’s technical community. This week on the stand is my good friend and occasional co-presenter, David O’Berry CSSLP, CISSP-ISSAP, ISSMP, CRMP. Now a McAfee Strategic systems engineer, his previous life was 19 years in the public sector, culminating as Director Read more…

Piggybacking WiFi at 60mph…

Wednesday, September 7, 2011 at 11:29am by Simon Hunt
Simon Hunt

I was in Madrid speaking at a conference a couple of months ago, and arriving after one of my favorite trans-Atlantic flights (you know the ones, where the ratio of screaming children to adults is not conducive to rest or even playing Angry Birds) I was excited to take one of the citi-cabs which have Read more…

Tags:

Take Two Of These Pills And Call Support In The Morning…

Friday, June 17, 2011 at 9:26am by Simon Hunt
Simon Hunt

“McAfee launches a range of pharmaceutical anti-viral medications to thwart the growing problem of Biological computer viral attacks”   Sounds far fetched? Maybe not given that researches at Caltech have successfully engineered a biological computer which can calculate square roots using DNA replication. Given that the researchers Lulu Quan and Erik Winfree have successfully demonstrated AND and OR logic gates at the Read more…

Tags: , , ,

Mobile Device, Or Not? That Is The Question

Wednesday, June 8, 2011 at 1:59pm by Simon Hunt
Simon Hunt

For the last couple of weeks I’ve been presenting around the U.S. at events such as Secure360 in St. Paul, and the McAfee Executive Summits in Boston and New York. One question I was asked at every event, was “What is a mobile device?” The flippant answer of course which after two weeks of middle Read more…

Tags: , , , , ,

Security In The Post-PC World

Thursday, May 19, 2011 at 11:56am by George Kurtz
George Kurtz

The recent arrival of Google’s Chromebook — a gadget designed to run only a Web browser — was heralded by some as spelling the end of antivirus and a nail in the coffin for companies that sell antivirus software. The Chromebook is part of a burgeoning category analysts call “post-PC devices.” Since these devices are Read more…

Tags: , , , , , ,

Exchange Personal Data For Stardom

Thursday, May 12, 2011 at 1:44pm by Raj Samani
Raj Samani

A couple of years ago a good friend phoned me in a panic – his car had been stolen.  A major inconvenience admittedly but he managed to replace it, and there were no further attempts from the criminals to contact him in an attempt to get more of his possessions.  The thing with the theft Read more…

Tags: , , , , , , ,

Critical Infrastructure Not Ready For Cyberattacks

Wednesday, April 20, 2011 at 12:38pm by George Kurtz
George Kurtz

On Tuesday, McAfee and CSIS issued our second annual critical infrastructure report, “In the Dark: Crucial Industries Confront Cyberattacks.” The good news? We took a close look at the sectors that affect you on a daily basis—power, oil, gas, and water—sectors that may well be the first targets of a serious cyberattack. The bad news? Read more…

Tags: , ,