How to combat cyber-terrorism Calum Mcloud Technology guardian.co.uk
Updated: 2010-11-30 07:45:17
Turn autoplay off Turn autoplay on Please activate cookies in order to turn autoplay off Jump to content s Jump to comments c Jump to site navigation 0 Jump to search 4 Terms and conditions 8 Mobile site Sign in Register Text larger smaller About us About us Contact us Press office Guardian Print Centre Guardian readers' editor Observer readers' editor Terms of service Privacy policy Advertising guide Digital archive Digital edition Guardian Weekly Buy Guardian and Observer photos Subscribe Today's paper The Guardian G2 features Comment and debate Editorials , letters and corrections Obituaries Other lives Sport EducationGuardian Subscribe Zeitgeist Today's hot topics guardian.co.uk Technology Web News Sport Comment Culture Business Money Life style Travel Environment TV Video Community
A new flaw in Google's Android phone software was disclosed this week. Can Google create an open platform and still maintain a secure environment? Read more…
A new zero day exploit has been revealed in Windows that can lead to an elevation of privilege. Find out the details and what you might do to protect yourself Read more…
A short history of Mac malware - from 1982 to 2010. Learn about the viruses, worms, Trojans and scareware that have affected Apple computers.
Do you protect your Apple Mac computer against malware? Read more…
Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive November 2010 20 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 204 Corporate 179 Enterprise 289 McAfee Labs 1022 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government identity protection
Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive November 2010 12 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 204 Corporate 178 Enterprise 286 McAfee Labs 1019 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety global threat intelligence google government identity protection malware McAfee Mid-Market Network
Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive November 2010 12 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 204 Corporate 178 Enterprise 286 McAfee Labs 1019 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety global threat intelligence google government identity protection malware McAfee Mid-Market Network
Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive November 2010 12 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 204 Corporate 178 Enterprise 286 McAfee Labs 1019 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety global threat intelligence google government identity protection malware McAfee Mid-Market Network
Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive November 2010 12 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 204 Corporate 178 Enterprise 286 McAfee Labs 1019 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety global threat intelligence google government identity protection malware McAfee Mid-Market Network
Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive November 2010 12 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 204 Corporate 178 Enterprise 286 McAfee Labs 1019 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety global threat intelligence google government identity protection malware McAfee Mid-Market Network