Feeds & Podcasts

Blogs

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

social media

Posts tagged under social media

2012 Trends in Social Business

Tuesday, January 24, 2012 at 2:10pm by Steven Fox
Steven Fox

In “Six Social Media Trends for 2012”, David Armano explores the evolution of social media into social business. “Social media,” says Armano, “continues to move forward towards business integration.”  According to Forrester’s Stephen Mann, the increasing ubiquity of mobile devices in enterprise environments is facilitating this trend. A joint Booz Allen/Buddy Media study found that Read more…

Tags: , , ,

McAfee Reference Architecture: Securely Enabling Social Media

Wednesday, January 18, 2012 at 12:33pm by Kim Singletary
Kim Singletary

Social media platforms have become ubiquitous in recent years, not only because connections are easy to make and conversations are rapid and short – but there is also the universal thrill of finding a great piece of content and sharing it with hundreds of thousands of online followers. This is especially true when that information Read more…

Tags: ,

Facebook Accounts Compromised by ‘Giveaway’ Scam

Tuesday, January 17, 2012 at 10:06am by Umesh Wanve
Umesh Wanve

A recent social engineering attack that targeted Facebook accounts hit very close to home. One of my friends mentioned to me that his account was no longer accessible and that his password was not working. He even found his primary email address changed to another email. So I went onto Facebook to see his wall Read more…

Tags: , , , ,

Share Pics Safely Online

Thursday, November 3, 2011 at 11:53am by Anindita Mishra
Anindita Mishra

For all of us, the true satisfaction from any event is derived when we share the anecdotes and pictures with friends and families. Whether it be a foreign trip, a wedding, a family get together or a friends’ reunion, we post these pics on our social networking sites like Facebook or Google+ so that others Read more…

Tags: , , , , ,

Is Getting More Followers Really the Goal?

Friday, October 28, 2011 at 11:19am by Tracy Mooney
Tracy Mooney

So I have been mildly obsessed (all right completely obsessed) with Pinterest lately. Pinterest is a website/social network where you can post images from sites/blogs/etc. My page looks like this… If you like, you can follow me here, though I admit I have not figured out how to post any security/technology related pins. This for me is Read more…

Tags: , , , , , , ,

Social Media Coverage at FOCUS 2011: Live Tweeting and Giveaways

Monday, October 17, 2011 at 10:41am by Eric Andre
Eric Andre

In addition to our activities and contests at the McAfee booth, our team will also be covering the show on Facebook and Twitter, live-tweeting from FOCUS sessions and keynotes on @focusconference, @McAfeeBusiness & @McAfee with the #McAfeeFOCUS hashtag, and posting photos and video on the FOCUS Conference Facebook page. You can also follow comprehensive updates Read more…

Tags: , , , , , ,

Join Us for #SecChat Thursday on McAfee and Intel DeepSAFE Technology

Tuesday, September 27, 2011 at 2:40pm by Ed Metcalf
Ed Metcalf

This month at Intel’s Developer Forum in San Francisco, McAfee unveiled DeepSAFE with Intel, a new security technology that sits beyond the operating system, close to the silicon, and allows for a unique vantage point in the computing stack to better protect systems. During our next #SecChat this Thursday, we’re opening up the discussion around Read more…

Tags: , , ,

Friends, Foes and Faceless Denizens – The Real Social Network

Monday, September 12, 2011 at 10:03am by Steven Fox
Steven Fox

I recently performed a penetration test of a transportation company in the Midwest. Save for a few low-severity vulnerabilities, Company X had a well-managed public-facing network infrastructure.  Satisfied with the status of their network security, I turned my attention to the human network. Searching for Company X on sites like Twitter, Facebook, and LinkedIn, I Read more…

Tags: , , ,

Long Weekend Security Highlights: Morto Worms, Linux Hacks and a Lesson in Pronunciation

Tuesday, September 6, 2011 at 2:08pm by Brian Contos
Brian Contos

This week’s (somewhat belated) Highlights are short and sweet with a quick review of the week’s top infosec topics. An Internet worm dubbed “Morto” was found spreading in the wild via Windows Remote Desktop Protocol (RDP). The worm is the first of its kind capable of spreading via RDP and has so far impacted a few Read more…

Tags: , , , ,

Friday Security Highlights: Social Media Catalyzes Hacktivism

Friday, August 19, 2011 at 9:44am by Brian Contos
Brian Contos

Welcome to our second edition of Friday Security Highlights, a weekly roundup of top infosec news, blogs and buzz from around the web. Earlier this week, we pushed out a tweet about how excited we are to offer this blog alongside Lang Tibbils’ In Wake of the Week, another recap focused specifically on McAfee news Read more…

Tags: , , , , ,