Enterprise

An Unmatched Customer Experience

I’ve been in this industry for over twenty years, and the advancements in cybersecurity over the last few years are unmatched. As an industry, we went from believing in a best-in-breed, siloed approach and now we understand our customers need a connected security architecture that can protect, detect, and correct. ...

McAfee Labs

5G Networks Pose Cyber Risks, Opportunities

Fifth-generation networking (5G) holds the potential for a massive immersion of technology into the lives of people and businesses. It is an evolution of technology that could allow enough bandwidth for 50 billion smart devices, driving toward a world in which everything that computes will be connected. Such transformative technology opens great ...

McAfee Labs

Security on Silicon the Next Big Step in Cyber Protection

With the growth of the Internet of Things, going from 15 billion to 200 billion devices by 2020, and the focus by attackers to get further down the stack, silicon-based security will play an increasing role in protecting technology and users. As attackers evolve, they get stronger, smarter, and more ...

Family Safety Identity Protection

What is Encryption?

Encryption is the science of encoding and decoding secret messages.  It began as cryptography—the ancient Greeks used it to protect sensitive information that might fall into the hands of their enemies. More recently, governments have used encryption for military purposes, but these days the term if often used in reference ...

McAfee Labs

Cidox Trojan Spoofs HTTP Host Header to Avoid Detection

Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP network pattern generated contains a few interesting parameters, names like “&av” (for antivirus?) and “&vm=”(VMware?), The response received looked to be encrypted, which drew my attention. Also, all the network ...

Enterprise

Taking Control Of Your Data In The Cloud

This blog was written by David Bull, McAfee’s former Director, Enterprise Solution Marketing. Who has access to my online data? What measures are being taken to protect it? What can I do to make sure it doesn’t end up in the wrong hands? The concerns behind these questions are rooted in our ...

Executive Perspectives

The Internet and Today’s Youth: Protecting our Future

May has been another very busy month packed with events and plenty of travel! I spent a few days with some of our best sales people at the McAfee President’s Club in Venice and Croatia, followed by a short stop at the McAfee Executive Summit in Frankfurt where I had ...

McAfee Labs

Botnet Control Servers Span the Globe

McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet.  With millions of McAfee endpoints and network security appliances sending information to McAfee Global Threat Intelligence (GTI) in the cloud, coupled with a vast collection of malicious binary and proactive research, McAfee Labs has a clear view ...

Enterprise

Bitlocker/Truecrypt Decryption Tool

Following on from my post “10 Things You Don’t Want To Know About Bitlocker”, “TPM Undressed” and “Firewire Attacks Revisited” it recently came to my attention that Passware, Inc. A feisty California company has released a version of their forensic software which will decrypt Bitlocker and TrueCrypt protected hard disks ...

Enterprise

Vulnerability in Some Secure USB Sticks

Recently a slew of news sites announced a newly discovered vulnerability (care of the German Security firm SySS) on a range of supposedly “secure” consumer USB sticks. With the right tools and know-how, these models from SanDisk, Kingston and Verbatim were apparently easy to defeat and retrieve the data from ...

Subscribe to McAfee Securing Tomorrow Blogs