• Geinimi Android Trojan horse discovered

    Updated: 2010-12-31 17:00:24
    Android users may not be at risk from as much malware on their smartphone as on their desktop computer, but that doesn't mean they should be careless about security. Read more…

  • 27th Chaos Communications Congress Mobile Security and More Blog Central

    Updated: 2010-12-31 01:28:28
    : Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer About Me Jimmy Shah Jimmy Shah is a Mobile Security Researcher for McAfee , specializing in analysis of mobile threats on existing Read More Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Anil Ramabhatta Anindita Mishra Anna Stepanov Apurv Anand Arun Pradeep Avelino Rico Jr Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Kenyon Brian Mann Cedric Cochin Chen Yu Chintan Shah Chris Barton Craig Schmugar Dan Sommer Dave Klenske David DeWalt David Marcus

  • Gawker told users it would fix password weakness in 2008 but didn't Technology guardian.co.uk

    Updated: 2010-12-31 01:28:24
    Turn autoplay off Turn autoplay on Please activate cookies in order to turn autoplay off Jump to content s Jump to comments c Jump to site navigation 0 Jump to search 4 Terms and conditions 8 Mobile site Sign in Register Text larger smaller About us About us Contact us Press office Guardian Print Centre Guardian readers' editor Observer readers' editor Terms of service Privacy policy Advertising guide Digital archive Digital edition Guardian Weekly Buy Guardian and Observer photos Subscribe Today's paper The Guardian G2 features Comment and debate Editorials , letters and corrections Obituaries Other lives Sport Film music Subscribe Zeitgeist Today's hot topics guardian.co.uk Technology Web News Sport Comment Culture Business Money Life style Travel Environment TV Video Data Offers Jobs

  • Gawker told users it would fix password weakness in 2008 but didn't Technology guardian.co.uk

    Updated: 2010-12-31 01:28:24
    Turn autoplay off Turn autoplay on Please activate cookies in order to turn autoplay off Jump to content s Jump to comments c Jump to site navigation 0 Jump to search 4 Terms and conditions 8 Mobile site Sign in Register Text larger smaller About us About us Contact us Press office Guardian Print Centre Guardian readers' editor Observer readers' editor Terms of service Privacy policy Advertising guide Digital archive Digital edition Guardian Weekly Buy Guardian and Observer photos Subscribe Today's paper The Guardian G2 features Comment and debate Editorials , letters and corrections Obituaries Other lives Sport Film music Subscribe Zeitgeist Today's hot topics guardian.co.uk Technology Web News Sport Comment Culture Business Money Life style Travel Environment TV Video Data Offers Jobs

  • Capturing or downloading YouTube and other videos Ask Jack Technology guardian.co.uk

    Updated: 2010-12-31 01:28:24
    Turn autoplay off Turn autoplay on Please activate cookies in order to turn autoplay off Jump to content s Jump to comments c Jump to site navigation 0 Jump to search 4 Terms and conditions 8 Mobile site Sign in Register Text larger smaller About us About us Contact us Press office Guardian Print Centre Guardian readers' editor Observer readers' editor Terms of service Privacy policy Advertising guide Digital archive Digital edition Guardian Weekly Buy Guardian and Observer photos Subscribe Today's paper The Guardian G2 features Comment and debate Editorials , letters and corrections Obituaries Other lives Sport Film music Subscribe Zeitgeist Today's hot topics guardian.co.uk Technology Web News Sport Comment Culture Business Money Life style Travel Environment TV Video Data Offers Jobs

  • Capturing or downloading YouTube and other videos Ask Jack Technology guardian.co.uk

    Updated: 2010-12-31 01:28:23
    Turn autoplay off Turn autoplay on Please activate cookies in order to turn autoplay off Jump to content s Jump to comments c Jump to site navigation 0 Jump to search 4 Terms and conditions 8 Mobile site Sign in Register Text larger smaller About us About us Contact us Press office Guardian Print Centre Guardian readers' editor Observer readers' editor Terms of service Privacy policy Advertising guide Digital archive Digital edition Guardian Weekly Buy Guardian and Observer photos Subscribe Today's paper The Guardian G2 features Comment and debate Editorials , letters and corrections Obituaries Other lives Sport Film music Subscribe Zeitgeist Today's hot topics guardian.co.uk Technology Web News Sport Comment Culture Business Money Life style Travel Environment TV Video Data Offers Jobs

  • WikiLeaks, Gawker, OpenBSD, Lineage II - 90 Sec News - Dec 2010

    Updated: 2010-12-29 03:51:41
    Don't just read the latest computer security news - watch it in 90 seconds! This month: the WikiLeaks show, massive Gawker password theft, an out-of-the-blue OpenBSD accusation, and virtual property stolen from Lineage II. Read more…

  • Mozilla accidentally publishes user IDs and password hashes

    Updated: 2010-12-28 09:09:35
    Mozilla, of Firefox and Thunderbird fame, had accidentally published the user IDs and password hashes of users of their addons.mozilla.org website. It appears their reaction to the disclosure has contained the damage, but what can be done to prevent these incidents in the future? Read more…

  • Beware Google Nexus S plus Android 2.3.1 update can equal wiped phone Technology guardian.co.uk

    Updated: 2010-12-25 23:40:41
    : Turn autoplay off Turn autoplay on Please activate cookies in order to turn autoplay off Jump to content s Jump to comments c Jump to site navigation 0 Jump to search 4 Terms and conditions 8 Mobile site Sign in Register Text larger smaller About us About us Contact us Press office Guardian Print Centre Guardian readers' editor Observer readers' editor Terms of service Privacy policy Advertising guide Digital archive Digital edition Guardian Weekly Buy Guardian and Observer photos Subscribe Today's paper The Guardian Comment and debate Editorials , letters and corrections Obituaries Other lives Sport Review Travel Family Money Work Weekend The Guide Subscribe Zeitgeist Today's hot topics guardian.co.uk Technology Web News Sport Comment Culture Business Money Life style Travel Environment

  • Beware Google Nexus S plus Android 2.3.1 update can equal wiped phone Technology guardian.co.uk

    Updated: 2010-12-25 23:40:41
    : Turn autoplay off Turn autoplay on Please activate cookies in order to turn autoplay off Jump to content s Jump to comments c Jump to site navigation 0 Jump to search 4 Terms and conditions 8 Mobile site Sign in Register Text larger smaller About us About us Contact us Press office Guardian Print Centre Guardian readers' editor Observer readers' editor Terms of service Privacy policy Advertising guide Digital archive Digital edition Guardian Weekly Buy Guardian and Observer photos Subscribe Today's paper The Guardian Comment and debate Editorials , letters and corrections Obituaries Other lives Sport Review Travel Family Money Work Weekend The Guide Subscribe Zeitgeist Today's hot topics guardian.co.uk Technology Web News Sport Comment Culture Business Money Life style Travel Environment

  • Hacker Spaces: Hacking Your Social Life

    Updated: 2010-12-25 18:00:58
    Back in 2007 a group of American hackers went to Germany and toured this esoteric place known as a hacker space. They liked what they saw and quickly founded the first hacker spaces in the United States. The goal was to set up collective spaces where curious types could come in and work on personal [...]

  • Making Sense of McAfee Risk Advisor Blog Central

    Updated: 2010-12-22 06:18:17
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer About Me Jim Walter Jim Walter currently serves as manager of the McAfee Threat Intelligence Service MTIS for McAfee Labs , and focuses Read More Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Anil Ramabhatta Anindita Mishra Anna Stepanov Apurv Anand Arun Pradeep Avelino Rico Jr Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Kenyon Brian Mann Cedric Cochin Chen Yu Chintan Shah Chris Barton Craig Schmugar Dan Sommer Dave Klenske David DeWalt David

  • Security Too Hard Think Globally Act Locally Blog Central

    Updated: 2010-12-22 06:18:15
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer About Me Sam Masiello Director of Messaging Security Research Sam Masiello oversees research across the full spectrum of Read More Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Anil Ramabhatta Anindita Mishra Anna Stepanov Apurv Anand Arun Pradeep Avelino Rico Jr Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Kenyon Brian Mann Cedric Cochin Chen Yu Chintan Shah Chris Barton Craig Schmugar Dan Sommer Dave Klenske David DeWalt David Marcus David Rayhawk

  • McAfee NSP Blog Central

    Updated: 2010-12-22 06:18:12
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 27 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 224 Corporate 181 Enterprise 301 McAfee Labs 1033 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • Network Evasions Blog Central

    Updated: 2010-12-22 06:18:11
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 27 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 224 Corporate 181 Enterprise 301 McAfee Labs 1033 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • One More Take on Gawker

    Updated: 2010-12-21 15:40:39
    Forget about everything that’s been made of password strength; it’s a red herring. True, you shouldn’t be using one common password across all sites, but that’s not a password selection issue. Should you pick good quality passwords that aren’t easily guessable? Absolutely. That being said, let’s forget about the rest of the rules, with perhaps [...]

  • Password managers – 1Password

    Updated: 2010-12-21 11:41:58
    How do you use a different strong password on every site without writing all of those passwords down or going mad – a password manager with randomly generated passwords. I have several machines I use on a very regular basis – both for work and personal use: at least one desktop and one laptop in [...]

  • Antievasion Blog Central

    Updated: 2010-12-20 11:00:52
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 22 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 222 Corporate 181 Enterprise 299 McAfee Labs 1031 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • IntruShield Blog Central

    Updated: 2010-12-20 11:00:51
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 22 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 222 Corporate 181 Enterprise 299 McAfee Labs 1031 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • McAfee Network Security Platform Blog Central

    Updated: 2010-12-20 11:00:50
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 22 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 222 Corporate 181 Enterprise 299 McAfee Labs 1031 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • AET Blog Central

    Updated: 2010-12-20 02:20:48
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 22 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 222 Corporate 181 Enterprise 299 McAfee Labs 1031 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • New Frontiers in HTML5

    Updated: 2010-12-18 04:21:09
    The discussion around the usual suspects of web application security (XSS, CSRF, injections, etc) hasn’t changed much in the last decade. Even high-profile website security incidents that get media attention often boil down to a clever application of one or more of these “basic” vulnerabilities. Part of the reason these techniques don’t seem to go [...]

  • BioMetric Safe

    Updated: 2010-12-16 19:26:54
    This portable safe BioBox keeps all of your important possessions secure at all times and battery-powered for on-the-go security. With up to 120 registered users and a mechanical backup key, you can grant access to everyone that you want - perfect for large businesses.

  • How Salted Hashes Protect Passwords

    Updated: 2010-12-16 05:01:03
    Many information security blogs, including this one, have discussed the recent data breach of gossip site Gawker and problems associated with leaked passwords. The story has demonstrated some of the risks associated with password storage. Gawker did store passwords using a form of encryption, but it was a weak algorithm and thus the encrypted data could [...]

  • Antid0te’ Coming to Boost Security for Jailbroken iPhones Blog Central

    Updated: 2010-12-15 19:11:55
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer About Me Jimmy Shah Jimmy Shah is a Mobile Security Researcher for McAfee , specializing in analysis of mobile threats on existing Read More Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Anil Ramabhatta Anindita Mishra Anna Stepanov Apurv Anand Arun Pradeep Avelino Rico Jr Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Kenyon Brian Mann Cedric Cochin Chen Yu Chintan Shah Chris Barton Craig Schmugar Dan Sommer Dave Klenske David DeWalt David Marcus

  • exploit Blog Central

    Updated: 2010-12-15 19:11:52
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • iphone Blog Central

    Updated: 2010-12-15 19:11:51
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • mobile devices and security threats Blog Central

    Updated: 2010-12-15 19:11:50
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • mobile security Blog Central

    Updated: 2010-12-15 19:11:49
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • Android Blog Central

    Updated: 2010-12-15 19:11:46
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • personal information over mobile phones Blog Central

    Updated: 2010-12-15 19:11:45
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • web security Blog Central

    Updated: 2010-12-15 19:11:44
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • Spammed malware linked into your Facebook photo Blog Central

    Updated: 2010-12-15 19:11:43
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer About Me Felix Martinez Web Security Researcher Read More Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Anil Ramabhatta Anindita Mishra Anna Stepanov Apurv Anand Arun Pradeep Avelino Rico Jr Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Kenyon Brian Mann Cedric Cochin Chen Yu Chintan Shah Chris Barton Craig Schmugar Dan Sommer Dave Klenske David DeWalt David Marcus David Rayhawk David Scharoun Dennis Elser Denys Ma Di Tian Dirk Kollberg Dmitri

  • Chile Blog Central

    Updated: 2010-12-15 19:11:39
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • Malware Experience Blog Central

    Updated: 2010-12-15 19:11:38
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • McAfee Labs Blog Central

    Updated: 2010-12-15 19:11:37
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • Hacktivism Blog Central

    Updated: 2010-12-15 19:11:27
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government

  • Keep Your Friends Close, but Your Passwords Closer

    Updated: 2010-12-14 22:17:23
    As Peter touched on when relating his story about the Gawker password database compromise (in addition to numerous other mentions on this blog), maintaining secure passwords for all of your various online identities is not something to take lightly.  In addition to secure passwords, you should also use passwords unique to each site you are [...]

  • Passwords, redux.

    Updated: 2010-12-14 05:31:16
    I received the following email on Monday morning: You don’t know me.  I’m nobody.  My name is Steve.  I came across a database dump from Gawker.com earlier this evening.  It’s making its rounds around the internet.  Besides just the code dump from gawker.com among other sites, it also contains email addresses and passwords for over [...]

  • Technology blog Technology guardian.co.uk

    Updated: 2010-12-13 08:30:38
    Turn autoplay off Turn autoplay on Please activate cookies in order to turn autoplay off Jump to content s Jump to site navigation 0 Jump to search 4 Terms and conditions 8 Mobile site Sign in Register Text larger smaller About us About us Contact us Press office Guardian Print Centre Guardian readers' editor Observer readers' editor Terms of service Privacy policy Advertising guide Digital archive Digital edition Guardian Weekly Buy Guardian and Observer photos Subscribe Today's paper The Guardian G2 features Comment and debate Editorials , letters and corrections Obituaries Other lives Sport MediaGuardian Subscribe Zeitgeist Today's hot topics guardian.co.uk Technology Web News Sport Comment Culture Business Money Life style Travel Environment TV Video Community Offers Jobs News

  • Encryption and the Law

    Updated: 2010-12-09 13:30:45
    For a while, it looked like the crypto wars had been won. The victory in the crypto wars didn’t last long. Today, there are a slew of laws in place in various countries controlling the use of strong encryption.

  • Responsibility Management

    Updated: 2010-12-03 19:45:56
    A number of our employees are currently spending a fairly large amount of their time helping a customer with a task.  In a perfect world, this task would be completely unnecessary.  Suffice it to say that there is some maintenance that must be performed on a number of systems before the year is out, and [...]

Current Feed Items | Previous Months Items

Nov 2010 | Oct 2010 | Sep 2010 | Aug 2010 | Jul 2010 | Jun 2010