Blog Posts Tagged with "McAfee"

D13f77e036666dbd8f93bf5895f47703

The Fight Against Spam Might Get a Little Easier

May 11, 2012 Added by:Theresa Payton

Facebook recently announced efforts to stop spammers by creating the Antivirus Marketplace. The service will provide a free six month license to antivirus software. McAfee, Symantec, Sophos and others are teaming with Facebook to offer free antivirus software...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Nearly Five Percent of All Smartphones Lost Every Year

March 20, 2012 Added by:Robert Siciliano

Based on the costly consequences of lost data assets, it makes sense to allocate the necessary resources to invest in anti-theft and data protection solutions in order to secure smartphones and the sensitive and confidential information they contain...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

McAfee Report: No Immunity from Targeted Attacks

February 22, 2012 Added by:Headlines

“The threat landscape continued to evolve in 2011, and we saw a significant shift in motivation for cyber attacks. Increasingly, we’ve seen that no organization, platform or device is immune to the increasingly sophisticated and targeted threats..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Seventy-Five Million Unique Malware Samples in 2012

February 08, 2012 Added by:Robert Siciliano

Imagine your body being targeted by 75 million viruses. That is exactly what’s happening to your digital devices. Laptops, desktops, netbooks, notebooks, Macs, iPads, iPhones, BlackBerrys, Androids, and Symbian mobile phones are all being targeted...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Top Security Company Acquisitions of 2011

January 31, 2012 Added by:Bill Gerneglia

The acquisition pace in the security industry has been steady the last few years due to the global proliferation of security breaches. Will this acquisition pace continue? Many analysts believe it will accelerate to address the proliferation of global security threats...

Comments  (0)

37d5f81e2277051bc17116221040d51c

2012 Threats: Are You Ready?

January 30, 2012 Added by:Robert Siciliano

Attackers from all over the world have set their focus on critical life supporting utilities such as water and power to hold those utilities hostage for payment or to disable them to cause terror. Unfortunately, many industrial and national infrastructure networks are vulnerable...

Comments  (0)

Bddcc5065237c686cb4d89dba8b276f2

Social Business Trends for 2012

January 26, 2012 Added by:Steven Fox, CISSP, QSA

The use of social media by merchants could be targeted by hacktivists with a social agenda or by hackers with financial goals. If hackers aligned themselves with protesters, they could launch social media campaigns designed to influence the perception of a business...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Security Beyond the Desktop

January 19, 2012 Added by:Robert Siciliano

The human link: There is an ever-widening disparity between the sophistication of networks and the people who use them. When direct attacks on an organization’s defenses fail, cybercriminals often use social engineering toolkits to exploit unsuspecting employees...

Comments  (0)

37d5f81e2277051bc17116221040d51c

McAfee: The Twelve Scams of Christmas

November 28, 2011 Added by:Robert Siciliano

Whether you like it or not, the Christmas machine arrived well before Thanksgiving — at least as far as stores and advertisers are concerned. And there’s no question that scammers, identity thieves, and criminal hackers have already begun setting traps for holiday shoppers...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Son of Stuxnet? Methinks the Cart be Before Ye Horse

October 19, 2011 Added by:Infosec Island Admin

And therein lies the rub. DUQU has a 36 day shelf life. Now, this is good from a foot-printing level AND could be excellent for setting up the next attack vector that could include the component of sustained access. It was a recon mission and that was all...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Experts Debate Merits of McAfee's Shady Rat Report

August 30, 2011 Added by:Headlines

"We consider those conclusions to be largely unfounded and not a good measure of the real threat level. Also, we cannot concede that the McAfee analyst was not aware of the groundlessness of the conclusions, leading us to being able to flag the report as alarmist," Eugene Kaspersky said...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

McAfee: 65 Million Malware Samples - That’s Just the Tip

August 30, 2011 Added by:Brent Huston

I was fascinated by this article that came across my newsfeed that said McAfee hit 65 million malware samples in the 2nd quarter of 2011. It seems that the malware cat truly is out of the bag. It also seems like someone forgot to warn the crimeware world about opening Pandora’s box...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What Identity Theft Protection Is and Is Not

August 24, 2011 Added by:Robert Siciliano

A true identity theft protection service monitors your identity by checking credit reports and scanning the Internet for your personal information. It looks out for your Social Security number, and if something goes wrong, has people who’ll work with you to resolve the problem...

Comments  (2)

37d5f81e2277051bc17116221040d51c

Myth: Apple Products Don’t Get Viruses

August 16, 2011 Added by:Robert Siciliano

The growing popularity of Apple products has inspired cybercriminals to create viruses that will harm Macs. Until now, Macs have been immune to these threats, but McAfee Labs is seeing the very first wave of fake programs targeted at Mac users...

Comments  (3)

7fef78c47060974e0b8392e305f0daf0

Operation Shady Rat: Or As I like To Call It...

August 15, 2011 Added by:Infosec Island Admin

It is readily apparent from this POS that McAfee has put out that they are just fishing for some press here for their flagging AV sales. This paper gives nothing relevant to the story around APT and as such, it should be just relegated to the dustbin of the internet and forgotten...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Congress Wants McAfee Briefing on Operation Shady Rat

August 11, 2011 Added by:Headlines

"If these intrusions can be classified as more 'unsophisticated' and 'opportunistic,' what is the threat of the more 'insidious' intrusions on which McAfee has focused in recent years? How can we effectively prevent or mitigate these more insidious intrusions?"

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »