Featured Blogs
LizaMoon the Latest SQL-Injection Attack
Working in the security industry brings about a myriad of challenges. This is especially true for vendors. We must do our best to educate and inform. At the same time, we want to avoid laying on the FUD–or scaring customers into making poorly educated security decisions. Which brings us to ...
Spyware A Major Identity Theft Threat
Spyware is sold legally in the United States. This software records chats, emails, browsing history, usernames, passwords, and basically everything a person does on that PC. Some spyware programs can record everything in a video file, which can then be accessed remotely. This is all perfectly legal as long as ...
Industry-Government Collaboration: Our Best Defense
I had the privilege of speaking before the House Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies at a hearing titled “Examining the Cyber Threat to Critical Infrastructure and the American Economy.” I was pleased to have the opportunity to provide McAfee’s perspective on the threats that face our nation’s ...
7 Types of Hacker Motivations
There are good and bad hackers. Here is a window into what they do and why: White Hat Hackers: These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure. These IT security professionals rely on ...
Google Tool Cleans Up Mobile Malware ‘Dream’
Over the weekend Google released the Android Market Security Tool to help clean up devices infected with the DroidDream malware. The Android/DrdDream family of malware used a pair of exploits (Expoit/LVedu and Exploit/DiutesEx) to gain root access on vulnerable Android devices. More than 50 Android applications were reported to be infected; all ...
Social Security Numbers Easily Cracked
It is easier than ever to guess or predict an individual’s Social Security number, which puts us all at a greater risk for identity theft. Researchers at Carnegie Mellon University have developed a reliable method for predicting Social Security numbers, using information from social networking sites, data brokers, voter registration ...
Lost or Stolen Mobile Devices Can Lead to Identity Theft
We lose stuff. You put something down, you get distracted, you forget about it and it’s gone. Stuff falls out of our pockets and bags all the time. I’m one of those people that’s so smart, I’m stupid and absent minded when it comes to my stuff. Where’s my wallet, ...
Books Fight Back
You know I always thought that at some point, printed books would go the same way as vinyl. Despite sporadic revivals by the music industry and its use by particular groups such as the electronic and “mixmasters,” the majority of households have already replaced turntables for the latest technologies. Equally ...
The 6 Types of Identity Theft
#1 New Account Fraud Using another’s personal identifying information to obtain products and services using that person’s good credit standing. This fraud often requires use of the victim’s Social Security number. Opening new utility, cell phone and/or credit card accounts are the most prevalent forms of new account fraud. #2 ...
Data Privacy Day
This is a critical time for our personal security as it relates to privacy and personal information. A battle is being waged over our data, and there are several parties involved in this fight. My concern is securing the personal details that you would prefer to keep private. Criminal hackers ...