Blog Posts Tagged with "McAfee"

69dafe8b58066478aea48f3d0f384820

Mobile Apps Vulnerable to Malicious Bypass Code

February 21, 2011 Added by:Headlines

The ongoing assumption has been that applications offered in the app marketplace have been vetted for security, but McAfee researchers have evidence that some mobile applications that have been approved for distribution may not be as secure as consumers would expect...

Comments  (1)

924ce315203c17e05d9e04b59648a942

Strategic Industries Should Go On High Alert

February 11, 2011 Added by:Richard Stiennon

Adversaries using pernicious methodologies are targeting the data of globally strategic industries. Business as usual based on risk based methodologies have to be supplanted by an urgent revamping of security deployments to counter a frightening new level of threat...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Energy Companies Hit by Chinese "Night Dragon" Attacks

February 10, 2011 Added by:Headlines

"Targeted attacks such as Night Dragon, orchestrated by a growing group of malicious attackers committed to their targets, are rapidly on the rise. These targets have now moved beyond the defense industrial base, government, and military computers to include global corporate and commercial targets..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

McAfee: Mobile Malware Growth at All-Time High

February 08, 2011 Added by:Headlines

The growing popularity and variety of mobile communications platforms and a lack of consumer awareness about proper security precautions have provided criminals with ample opportunity to exploit devices like smartphones and tablets...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

McAfee's Top Five Exploits and Scams of the Decade

January 30, 2011 Added by:Headlines

McAfee has issued an interesting report that explores ten years of innovation in malware and online criminal activity. The report goes into detail about the evolution and culture surrounding landmark exploits and cyber scams, and presents a really interesting read...

Comments  (0)

37d5f81e2277051bc17116221040d51c

McAfee's Ten Tips for Securing New Devices in 2011

January 23, 2011 Added by:Robert Siciliano

Use software that backs up smart devices and use strong discretion when storing, saving or editing personal information on your smartphone or device. Don’t keep all of your personal passwords on your device, and avoid using it to store financial information like credit card and bank account numbers...

Comments  (0)

37d5f81e2277051bc17116221040d51c

New Consumer Electronics Lacking Security

January 20, 2011 Added by:Robert Siciliano

Researchers discovered they could hack into Internet-ready HDTV’s. One of the top five best-selling TVs left its security process vulnerable to attack, allowing a hacker to compromise the data transmitted between the TV and websites that provide content...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Did Zeus-SpyEye Exploit Toolkit Hit the Black Market?

January 18, 2011 Added by:Headlines

"The developer said the next combined version should be private (not released in an open forum) and with a price near US$4,000. Could this announcement be a scam? Of course, only when we discover a sample of this malware will we know for certain that it is now in the wild"...

Comments  (0)

37d5f81e2277051bc17116221040d51c

McAfee's Top Targets for Emerging Threats in 2011

January 17, 2011 Added by:Robert Siciliano

This is McAfee Labs list comprises 2010′s most buzzed about platforms and services, all of which are expected to be major targets for cybercriminals in the coming year...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Researcher Links anonops.ru IRC with Cyber Criminals

January 14, 2011 Added by:Headlines

"Whenever a big event occurs around the world cybercrime jumps at the chance to exploit it. And this appears to be the case with WikiLeaks and Anonymous. What an opportunity for criminals to take advantage of a volunteer army eager to take part in a struggle"...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Ten Big Information Security Stories from 2010

January 02, 2011 Added by:Headlines

The ensemble does not focus solely on the pop-security issues that made the biggest headlines per se, but is instead a thoughtful examination of some of the stories that will prove to have the biggest impact and long term effects on the information security field as a whole...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Expect a Cyber Espionage Blitz in 2011

December 31, 2010 Added by:Headlines

Companies of all sizes that have any involvement in national security or major global economic activities — even peripherally, such as a law firm advising a corporate conglomerate starting business in another country — should expect to come under pervasive and continuous APT attacks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Security Events of 2010

December 27, 2010 Added by:Headlines

2010 has proved to be a most eventful year for the information security field. From the WikiLeaks "Cablegate" disclosures to Chinese state-sponsored hacking, the Stuxnet virus to Google's WIFI intrusions, 2010 will certainly be remembered as a benchmark year.

Comments  (0)

F520f65cba281c31e29c857faa651872

Security is the New Business Enabler

December 04, 2010 Added by:Rahul Neel Mani

Michael Sentonas is Vice President and CTO Asia Pacific at McAfee Inc. In an interaction with R Giridhar at the recent McAfee Focus 10 event, discusses the evolving security landscape and the new approaches to security...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Meet the Most Dangerous Domain - .VN

November 15, 2010 Added by:Headlines

More than half of the domains with the suffix .VN contain malicious code meant to infect surfers and steal sensitive information, according to research released by McAfee. .VN is the riskiest national domain to visit, exceeded only by the ubiquitous .COM and .INFOR...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China Hijacked Fifteen Percent of Internet Traffic

November 12, 2010 Added by:Headlines

Imagine the capability and capacity that is built into their networks. I’m not sure there was anyone else in the world who could have taken on that much traffic without breaking a sweat - Dmitri Alperovitch, McAfee's vice president of threat research stated...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »