Feeds & Podcasts

Enterprise Blogs

Meet the Bloggers

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety Friday Security Highlights global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel internet security iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile malware mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

System Endpoint

In this blog, McAfee experts explore the latest workflow advancements and threats targeting your company’s endpoints. Topics range from current issues such as desktop virtualization, to web application vulnerabilities, and the security benefits and flaws of the most recent product releases and patches.

Posts in System Endpoint

Is A New Virus Hitting In Iran?

Monday, April 25, 2011 at 4:05pm by Joris Evers
Joris Evers

The Iranian government on Monday said it was targeted by a new computer virus dubbed “Stars.” The report came from the director of Iran’s Passive Defense Organization through the country’s Mehr News Agency. Global media subsequently picked up the story, which has now been covered by the Associated Press, BBC, Reuters and many others. Stars would Read more…

Tags: , , , ,

Easter Greeting Hatches Nasty Malware Surprise

Monday, April 18, 2011 at 10:39am by Joris Evers
Joris Evers

Cybercrooks always latch on to current events to lure unsuspecting Internet users into their traps. It doesn’t matter what type of event it is, a natural disaster, major sporting championship or, in today’s case, Easter, the upcoming Christian holiday. This morning I received an e-mail (see below) with a colorful picture of a bunny, some Read more…

Tags: , , , , , , ,

What Will Patch Tuesday Mean to You in 2011

Tuesday, December 14, 2010 at 2:13pm by Evelyn de Souza
Evelyn de Souza

Has Patch Tuesday become an all too familiar nightmarish ritual that shows signs of only escalating numbers of vulnerabilities to be patched? Does each month represent a new record in the time taken by your IT staff to get critical systems (servers and devices) and laptops patched? If December 14 is an indication of the Read more…

Tags: , , , ,

“Sharing is Caring” in protection for SharePoint 2010

Tuesday, July 27, 2010 at 4:37pm by Lillian Wai
Lillian Wai

As a child, I was always taught that “sharing was caring”. So I shared my toys with my brothers, shared my candy with sister – and we all got along beautifully, and of course, made our parents happy. Now that same “sharing” philosophy has helped me in my business collaboration of sharing documents and marketing Read more…

Tags: , ,

Security Tips for Black Hat and DEFCON Attendees

Tuesday, July 27, 2010 at 2:54pm by Joris Evers
Joris Evers

Being a little paranoid when it comes to computer security is a good thing. When you travel to a security event like Black Hat and, in particular, DEFCON, that level of paranoia should be turned up a few notches. I’ll unfortunately miss both events again this year, but my colleagues at McAfee and McAfee Labs will Read more…

Tags: ,

Why Desktop Virtualization is Difficult

Thursday, July 22, 2010 at 1:14pm by Kim Singletary
Kim Singletary

One of the critical aspects of desktop virtualization is that it is disruptive to the end-user. Even though the technology is primed for operational returns not enough has been done to prepare the end-user to the new way of interacting and working with virtual desktops. The corporate endpoint, unless well controlled, was the biggest risk Read more…

Tags:

Application Whitelisting – Past, Present & Future

Tuesday, July 13, 2010 at 1:45pm by Swaroop Sayeram
Swaroop Sayeram

The concept of application whitelisting (AWL) is very fundamental – You have a finite list of trusted applications and only those are allowed to run. Going down memory lane… This was productized by a few vendors post-Y2K, and was an ideal fit in the fixed function device market – ATMs, medical devices, manufacturing systems, point Read more…

Tags:

Lost the Keys to Okena?

Friday, June 18, 2010 at 3:22pm by Evelyn de Souza
Evelyn de Souza

On June 11, Cisco announced end-of-life and end-of-sale of the Cisco Security Agent (CSA) ending months of speculation. Cisco will continue to support CSA for three years but without product enhancements.  CSA is a host intrusion prevention product for endpoints and servers made originally by Okena and which was acquired by Cisco in 2003. Cisco CSA Read more…

Tags: , , ,

Microsoft Gives us More Work on Tuesday

Wednesday, June 9, 2010 at 5:32pm by Evelyn de Souza
Evelyn de Souza

Microsoft delivered 10 security updates yesterday to patch a record-tying 34 vulnerabilities in Windows, Internet Explorer, Office and SharePoint.  Microsoft labeled three as “critical” – because they allowed attackers to remotely install malware on victim machines – two address issues in Windows and the third, tackles Internet Explorer (IE).  The IE update fixes vulnerabilities that Read more…

Tags: , , , , ,

Redefining Virtual Desktop Security

Wednesday, May 12, 2010 at 11:13pm by Kim Singletary
Kim Singletary

It’s been a hush-hush project till now! McAfee and Citrix working together redefining virtual desktop security. Brian Barney, McAfee executive vice president product operations, is presenting here with Mark Templeton, CEO of Citrix about the new partnership at the Citrix Synergy Keynote 2010. It was a very exciting keynote with the focus on how Citrix Read more…

Tags: , ,