Search Results

Enterprise

State of Online Commerce 2013: Word Clouds

  Online commerce is having a greater impact on our lives as more and more businesses take advantage of these new sales channels, from e-tail to mobile commerce, to creating stand-alone mobile apps. With this in mind, we pinpointed four key topics impacting the eCommerce industry today, and created word ...

Cloud Security

I’ve Got Sunshine on a Cloudy Day!

Cloud services, or Cloud in short, enable a massive disruption of the IT industry because they fundamentally change the economics and velocity of innovation. As such Cloud enables fundamental transformations in almost every field of human endeavor that can benefit from innovation and from information – I say “almost every ...

Consumer Threat Reports

Love, Relationships, and #SextRegret: It’s Time to Take Back the Web

What would you do if someone threatened to post risqué photos of you on the Internet? According to a new McAfee survey, 68.7% of us have used a smartphone to send personal or intimate text messages, emails, or photos – a habit that could put your privacy (and even your ...

Mobile and IoT Security

Apps Tracking Your Location: Friendly or Creepy?

There is no denying the fact that the world has gone wireless. With the explosion of smartphones and the “bring your own device” (BYOD) movement, it is not hard to believe that more than 85% of American adults own a mobile phone and over half of them use them access ...

Mobile and IoT Security

App Lock: The Security System for Unprotected Mobile Apps

Lock: To fasten, to make secure, to confine or exclude by. To fix in place so that movement or escape is impossible; hold fast. The word ‘lock’ is relevant in every aspect of our modern lives. We lock our houses, cars, bikes, hotel rooms, computers, and even our luggage when ...

Consumer Threat Reports

Hack the Vote: Pros and Cons of Electronic Voting

After 17 months and billions in campaign spending, it was up to the scores of American people who flooded churches, schools, homes and auditoriums to cast their ballots for the future of American leadership. But amidst the highs and lows of election night, there was an ongoing conversation on how ...

Identity Protection Mobile and IoT Security

Actress Sofia Vergara’s Personal Photos Hacked or Stolen Via Mobile

In my line of work I get emails such as this one: “Hi Robert, I’m not sure if you saw what had happened on my Facebook page last night, but someone stole my cell phone while I was at a concert, and posted all of my naked pictures off of ...

Consumer

2012 Online Safety Survey – Majority Of Americans Do Not Feel Completely Safe Online

From tweens and teens to silver surfers, more people are jumping onto multiple Internet connected devices every day.  It’s very exciting to see the proliferation of information sharing and communication between people on these devices at any time. Since October is National Cyber Security Awareness month, it’s a good reminder ...

Identity Protection Mobile and IoT Security

What Are The Risks Of A Lost Or Stolen Mobile Device?

Have you ever thought about what would happen if you lost your mobile phone? These days we rely on our mobile phones more than ever. For a lot of us, it can also be a nightmare if it’s lost, stolen or hacked, especially since today it’s become our most personal ...

Enterprise

Backup Security Best Practices

Network and mobile data breaches get much of the publicity today, but there’s another less publicized avenue susceptible to both insider and outsider attacks: backup. In early April, for example, Emory Healthcare in Atlanta lost the personal information of 315,000 patients when it discovered that 10 backup discs were missing. ...

Subscribe to McAfee Securing Tomorrow Blogs