• Is Samsung intentionally shipping laptops with keylogger/spy software?

    Updated: 2011-03-31 00:15:16
    Network World reported today that Samsung may be shipping some new laptops with a keylogger pre-installed. When the customer contacted Samsung tech support they acknowledged its presence after much questioning. Read more…

  • BP in troubled waters over Gulf oil spill data spill

    Updated: 2011-03-30 02:14:22
    US National Public Radio reports today that BP's Gulf oil spill woes - which already include paying out compensation amounting to a whopping $4B - have been worsened by a data spill. Just one lost laptop caused all the trouble. Read more…

  • Low Orbit Ion Cannon – A Very Simple Tool for Broad Distribution

    Updated: 2011-03-24 10:00:20
    So, last night I downloaded a version of the Low-Orbit Ion Cannon, the traffic generation tool which Anonymous has been using to attack various websites. The version I acquired, from SourceForge, was not one which had been modified for use by Anonymous – it didn’t have the “Hive” function which allows it to be utilized [...]

  • A Non-Technical Guide to Understanding the Fraudulent Comodo Certificates Story

    Updated: 2011-03-23 21:38:14
    Over the last few months, many people have talked about using HTTPS with sites such as Facebook and Twitter. The technology came up often after the release of Firesheep, which allowed Wi-Fi users to hijack other users who used these sites without HTTPS. Part of the technology behind HTTPS are certificates – small electronic files [...]

  • Did Comodo violate its own practices?

    Updated: 2011-03-23 21:11:23
    Earlier today, news began to spread about an exploited certification authority (CA) spotted in the wild. The Tor project blog has an excellent write-up on how they detected the presence of patches blocking particular SSL certificates and worked backwards to determine that a Comodo issuer had been compromised. The folks at Tor suppose (rightly) that [...]

  • Moving to a Forum

    Updated: 2011-03-22 06:26:08
    For CSE 484 this year, we have switched from the blog format to the forum format.  The course website is online at http://www.cs.washington.edu/education/courses/484/10wi/.  This year’s forum is online at https://catalysttools.washington.edu/gopost/board/kohno/14597/.  We switched from the blog format to the forum format because forums seem to provide a better opportunity for interactive discussions within the course.

  • 2012 London Olympics Blog Central

    Updated: 2011-03-22 06:26:08
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive March 2011 40 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 283 Corporate 192 Enterprise 327 McAfee Labs 1058 Tags 1 million guarantee access to live fraud resolution agents Acquisition Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring and resolution critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security encryption Endpoint Protection enterprise facebook Family

  • Olympic scams Blog Central

    Updated: 2011-03-22 06:26:07
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive March 2011 40 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 283 Corporate 192 Enterprise 327 McAfee Labs 1058 Tags 1 million guarantee access to live fraud resolution agents Acquisition Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring and resolution critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security encryption Endpoint Protection enterprise facebook Family

  • Current Event – A Broader Look on Wireless Access Point Vulnerabilities

    Updated: 2011-03-22 06:26:06
    Wireless access points are a great technology – allowing a user the convenience of accessing the same wired network without wires.  But the vulnerabilites and weak points that they produce can often be overlooked.  Most people install these devices to extend their network to laptop or other wireless users, and can be secured if they [...]

  • olympics Blog Central

    Updated: 2011-03-22 06:26:06
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive March 2011 40 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 283 Corporate 192 Enterprise 327 McAfee Labs 1058 Tags 1 million guarantee access to live fraud resolution agents Acquisition Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring and resolution critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security encryption Endpoint Protection enterprise facebook Family

  • Current Event : Keyboard hacking (from thin air!)

    Updated: 2011-03-22 06:26:05
    A move over scanning the keyboard with infra-red cameras for heat signatures, listening to keystrokes and simple shoulder surfing. Say hello to hacking through thin air or electromagnetic waves, rather. Apparently, all keyboards generate unique electromagnetic waves for every single key pressed and these are really easy to pick up even with some inexpensive antennae. [...]

  • Security Review: Urban Chicken Coops

    Updated: 2011-03-22 06:26:04
    Chicken coops form the heart of many urban farmers’ livelihoods. Providing sustenance directly through eggs, indirectly through fertilization of soil, and supplementing any waste management system through the digestion of otherwise unusable organic matter, the occupants of these structures play a vital role in small-scale subsistence living. Yet with such a range of assets come [...]

  • phishing scams Blog Central

    Updated: 2011-03-22 06:26:04
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive March 2011 40 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 283 Corporate 192 Enterprise 327 McAfee Labs 1058 Tags 1 million guarantee access to live fraud resolution agents Acquisition Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring and resolution critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security encryption Endpoint Protection enterprise facebook Family

  • Google’s Online Library

    Updated: 2011-03-22 06:26:02
    Google has been scanning whole books and archiving them since at least 2004.  More recently, it settled a lawsuit that will allow it to legally copy copyrighted books and making them available online.  Google allows users to search their book archive at Google Book Search, and view samples or in some cases entire books.  While [...]

  • Security Review: New Weapons in the Fight Against Doping

    Updated: 2011-03-22 06:26:01
    The use of performance enhancing drugs and medical techniques is a serious problem in every sport, but no sport is as notorious for doping scandals as is professional cycling. While Olympic athletes, baseball players, and body builders are often caught boosting, the effect of their “cheating” on the sport, society, and economy is minimal. Marion [...]

  • Security Review: Helios Online Voting

    Updated: 2011-03-22 06:25:59
    The Technology The technology being evaluated is the Helios Online Voting Booth, usable at http://www.heliosvoting.org and outlined in the 2008 Usenix Secuirty paper available at the same site. The election system does not create novel cryptographic tools or algorithms, rather it provides a protocol for using existing cryptography to make an election that is universally [...]

  • Security Review: Online Taxes

    Updated: 2011-03-22 06:25:58
    For the last couple of years, I have done my taxes online.  Compared to doing them by hand on paper, the online method takes far less time to fill out.  However, it also brings with it the host of security risks associated with entering sensitive data over the internet.  To successfully file your tax return, [...]

  • Security Review: Eye-Fi

    Updated: 2011-03-22 06:25:56
    Eye-Fi “The Eye-Fi Card stores photos & videos like a normal memory card. When you turn your camera on within range of a configured Wi-Fi network, it wirelessly transfers your photos & videos. To your computer. Or to your favorite photo sharing web site. Or both.” The Eye-Fi card is an SD memory card used [...]

  • Security Review: Hollywood Awards Presentations

    Updated: 2011-03-22 06:25:55
    Big Hollywood parties have big time guest lists, so it’s no wonder that many people want to be there.  These include both (mostly) benign fans and some people of the less benign variety.  Hence, security at these events is a big deal.  In 2000, the event’s security made national headlines when the oscar statues were [...]

  • Teen Guide to Safe Blogging

    Updated: 2011-03-22 06:25:46
    Larry Magid's open letter to teen age bloggers - and their parents

  • How Did You teach Your Kids To Be Safe When They Were Learning To Surf The Internet?

    Updated: 2011-03-22 06:25:45
    Take a few minutes to share your experiences in teaching your kids Internet Safety - and check out what other parents have done

  • Smart Phone Compatible H.264 DVR Security System

    Updated: 2011-03-22 06:25:45
    This Digital Surveillance System includes a built-in DVR that supports four indoor/outdoor cameras with night vision has multiple video viewing and recording features, and with H.264 compression - you'll be able to access live video footage directly from your iPhone or Blackberry Smartphone.

  • Family Safety Guidelines for Protecting Our Children

    Updated: 2011-03-22 06:25:44
    Internet safety policies and practical guidelines to help make the Internet safer for children and their families.

  • Online Security Tips ebook - with Bonus

    Updated: 2011-03-22 06:25:43
    Vital Security Tools and Tips to Secure Your Computers - Guard Against Fraud and ID theft - includes PC Safety book plus free Resale Rights

  • Internet Security Articles

    Updated: 2011-03-22 06:25:42
    A Library of Free Internet Security Articles and Computer Safety Articles and Reports on Maintaining Your Computer Protection against adware, spyware, vituses and trojan horses

  • When Good AntiVirus Goes Bad

    Updated: 2011-03-15 14:09:42
    Yesterday, I started getting a bunch of warnings from the anti-virus program I’ve got installed on my Mac – F-Secure Mac Protection Technology Preview. Since I wasn’t doing anything out of the ordinary or perform any “suspicious” behavior, this was a surprise to me. (Especially considering I had only received one virus alert from the [...]

  • Lessons from the Fukushima Nuclear Accident

    Updated: 2011-03-14 19:16:07
    Unless you’ve been living under a rock for the past week, then you undoubtedly know that Japan was rocked a few days ago by an 8.9 magnitude earthquake (the 3rd largest in the past decade and top 10 overall – also check out the NYT’s before & after shots) and a subsequent tsunami that exponentially [...]

  • World Record for Disaster Scam Site Blog Central

    Updated: 2011-03-13 14:47:27
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer About Me Chris Barton Having been with big red since the Dr Solomons acquisition Chris has seen many come and go but is never content to be Read More Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Anil Ramabhatta Anna Stepanov Apurv Anand Arun Pradeep Avelino Rico Jr Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Kenyon Brian Mann Carlos Castillo Cedric Cochin Chen Yu Chintan Shah Chris Barton Craig Schmugar Dan Sommer Dave Klenske David DeWalt David

  • SSLScan

    Updated: 2011-03-10 23:21:00
    How do you know which ciphers your SSL service supports? The best way to find out is to ask, and that’s exactly what SSLScan does. SSLScan is a command-line tool that, given an address and port, will generate a long list of ciphers and report whether the SSL service at the location accepted or rejected [...]

  • Georg Wicherski Blog Central

    Updated: 2011-03-08 01:21:59
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive March 2011 26 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 276 Corporate 191 Enterprise 326 McAfee Labs 1056 Tags Acquisition Channel Partners Compliance Consumer counter identity theft critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security encryption Endpoint Protection enterprise facebook Family Safety global threat intelligence google government identity protection identity theft lost wallet protection malware McAfee McAfee Identity

  • Nothing to see here, but don’t move along just yet.

    Updated: 2011-03-07 16:15:10
    If you’re interested in online security, you’ve probably heard about HBGary. If you haven’t, here’s a brief rundown with a few links: A security firm, HBGary (or, more accurately, HBGary’s subsidiary HBGary Federal) announced that they had discovered the names of some of the supposed ringleaders of the “hacktivist” organization Anonymous. This “angered the hive” [...]

  • Critical Windows patches coming up on Tuesday

    Updated: 2011-03-04 23:08:43
    Looks like there will be some pretty important patches released next week by Microsoft. According to the advance notice issued yesterday, there are three remote code execution vulnerabilities in Windows and Office that need to be patched. The advance bulletin doesn’t detail exactly what the problems are, but remote code execution vulnerabilities are serious problems. [...]

  • Android Malware Blog Central

    Updated: 2011-03-04 22:24:51
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive March 2011 14 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 272 Corporate 190 Enterprise 324 McAfee Labs 1050 Tags Acquisition Channel Partners Compliance Consumer counter identity theft critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security encryption Endpoint Protection enterprise facebook Family Safety global threat intelligence google government identity protection identity theft malware McAfee McAfee Identity Protection McAfee Initiative to

  • Smartphone Malware in the Wild

    Updated: 2011-03-03 14:30:43
    Back in August, my colleague Tim Donaworth posted about security threats in Android. Smartphone malware and smartphone botnets are buzz phases right now, but when speaking about my research in the field I am often asked, “Will this sort of attack actually happen outside of a lab?” The answer is not only will it, it [...]

Current Feed Items | Previous Months Items

Feb 2011 | Jan 2011 | Dec 2010 | Nov 2010 | Oct 2010 | Sep 2010