Feeds & Podcasts

Blogs

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety Friday Security Highlights global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile malware mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

Monthly Archives: February 2012

How Valuable Is Your Time?

Friday, February 3, 2012 at 3:44pm by Tracy Mooney
Tracy Mooney

Do you remember that time my husband clicked on scareware? Or that story I tell about before I started blogging for McAfee, the kids downloaded a virus onto the computer that we couldn’t get rid of and we had to send the pc back to the store? I bet I never told you about how Read more…

Tags: , , , , , , ,

Android Market Gets a Bouncer to Kick Out Malware

Friday, February 3, 2012 at 10:17am by Jimmy Shah
Jimmy Shah

Today Google announced its Bouncer security service for the Android Market. This is a good initial step in protecting Android users. Respect the Bouncer To keep out known troublesome apps, the service performs a malware and spyware scan on all submitted material. It also uses behavioral analysis to determine if a given app is trying Read more…

Tags: , , ,

Cyber Insurance and Security

Friday, February 3, 2012 at 8:54am by Kim Singletary
Kim Singletary

I recently read an article in Computerworld that really got me thinking about servers: what they are, what they do and what they hold. Traditionally, the insurance industry has offered risk protection from tangible events – even if they are unpredictable.  Hurricane and earthquake insurance are factored by damages and physical loss; but how would Read more…

Tags:

Got A New Smartphone, iPod, Xbox or Laptop? Is It Hacker, Virus, and Theft Safe?

Wednesday, February 1, 2012 at 11:30pm by Anindita Mishra
Anindita Mishra

The Cybermum India household is all agog with excitement, for yours truly has FINALLY relented and given in to the unanimous coaxing of the household to buy a smartphone. Sample the arguments I faced. “These are quite affordable these days, you know,” said the geek. (Round One to kiddos-they know my weak points) “Think how Read more…

Tags: , ,

McAfee Reference Architecture: Protecting Information

Wednesday, February 1, 2012 at 11:12am by Brian Contos
Brian Contos

Simply put, information is valuable. From intellectual property and financial data to personal details and government secrets, internal and external attackers have been targeting sensitive information since well before the digital era. The difference today is that information has gone viral. It lives in the datacenter, laptop, removable storage device, mobile phone, and in the Read more…

Tags: ,