• DevilRobber Mac OS X Trojan horse spies on you, uses GPU for Bitcoin mining

    Updated: 2011-10-29 10:06:54
    Spread via torrents, new Mac malware doesn't just try to rob you of your information - it's also keen to steal your computing time.

  • 600,000+ compromised account logins every day on Facebook, official figures reveal

    Updated: 2011-10-28 12:35:42
    Every 140 milliseconds, an account is compromised on Facebook. The social networking giant announces new security features, and talks about its fight against cybercrime.

  • f.ounders Dublin 2011

    Updated: 2011-10-28 01:21:55

  • More Mac malware - new Tsunami backdoor variants discovered

    Updated: 2011-10-27 23:33:07
    New variants of the latest Mac malware - the Tsunami backdoor Trojan - have been discovered. The sky is not falling, and Mac users should not panic. But it may still be prudent to ensure your computers are protected against this and other Mac threats.

  • Removing Old JAVA

    Updated: 2011-10-27 20:00:49
    As part of deployment of JAVA 1.6 update 29, I decided it was time to take a closer look at removing older versions of JAVA. At one point in time, new JAVA installs left all previous versions installed on the system.   In 1.6 update 10, JAVA began installing JAVA into %programfile%\java\jre6.   Each subsequent update would replace the [...]

  • Personal Bug Sweeper

    Updated: 2011-10-27 08:11:48
    This personal bug detector is an all-in-one counter-surveillance tool. Detect the presence of wired and wireless cameras, wireless mics, transmitter bugs, and GPS trackers in seconds.

  • SCUPing JAVA (or not)

    Updated: 2011-10-27 01:14:40
    Back in June I wrote about my methodology of deploying SCUP and how I wished I had the time to work out deploying JAVA with SCUP.   The quarterly update for JAVA was released last week, so it was time to go another round. When deploying JAVA in an interactive manner, the install will prompt the user if [...]

  • Stronger Passwords Tutorial Video

    Updated: 2011-10-26 04:35:19
    When it comes to giving advice about picking strong passwords, experts are quick to point out some of the good password generators and managers available, or recite best-practices for making up your own. And although we do so with the best of intentions, it’s still easy for people’s eyes to gloss over when presented with [...]

  • Ravens Embrace iPad – Belichick Rejoices

    Updated: 2011-10-20 02:39:39
    The New York Times had an article on the use of iPads by Baltimore Ravens and the Tampa Bay Bucs to replace their playbook.   They briefly mention some of the security involved. The article mentions the following security 1.   Device username Password 2.  The playbook app also has a separate password. 3.  Some data is kept [...]

  • Bluetooth Mobile Phone Recorder

    Updated: 2011-10-18 20:11:53
    The Bluetooth Mobile Phone Recorder pairs quickly with any cell phone with Bluetooth, enabling you to easily record both sides of a conversation. Stores 340 hours of audio!

  • Cyber-Ark / Qualys Integration

    Updated: 2011-10-17 02:18:22
    Last year at about this time, Qualys and Cyber-Ark announced a new integration.   I implemented this last week. Most companies have password policies requiring the expiration of passwords.   Yet these policies hardly ever get applied to service and application accounts only users.   Many times these service passwords even predate the implementation of strong password requirements.  This is [...]

  • More Fun with SEP GUIDs.

    Updated: 2011-10-16 03:18:08
    After fighting with duplicate hardware IDs in Symantec Endpoint Protection not that long ago, it was surprising to find the problem back again.   Were these left over from the original problem, or was this a return engagement.   And if it was a problem cropping up again, was it caused by someone forgetting to do the [...]

  • Can Client-Side JavaScript Protect Itself?

    Updated: 2011-10-14 04:59:58
    Security researcher Mario Heiderich (also creator of the HTML5 Security Cheatsheet and lead developer for PHPIDS) has been posting some interesting cross-site scripting challenges lately that highlight aspects of security on the client side. The most recent, called XSSMe², involved a page with a reflected XSS vulnerability that allowed one to insert arbitrary HTML – no [...]

  • Kingsoft Office provide free PDF converter solutions

    Updated: 2011-10-12 09:51:20
    13th, Oct, 2011 from KSOffice Team Kingsoft Office 2010 is the best alternative of Microsoft Office 2010/2007, it support all of Microsoft Office document types and you can open, edit, save in Microsoft Office doc/docx, xls/xlsx, ppt/pptx. For most of Office suite functions, Users can not feel the difference of these two products. Except fully compatible [...]

  • Kingsoft Powerword 2011 New features

    Updated: 2011-10-11 04:52:54
    11st, Oct, 2011 from KSOffice Team Kingsoft PowerWord is an ideal e-dictionary for people at all levels, designed to meet your translation, research or study needs at your fingertips. It already had more than 20 million activate User today, and recommended by over 50,000 educational insitutes, govenment agencies and global corporations. Kingsoft Powerword has been on the [...]

  • The Digital Underground

    Updated: 2011-10-08 03:56:38
    A lot of what we security professionals do includes protecting information from being compromised (especially personal information). The shift towards more profit-driven computer crime has happened swiftly over the last decade, so it should come as no surprise that there is a booming underground market centered almost entirely around compromised financial and personal data. And, [...]

  • Black Box Micro

    Updated: 2011-10-06 07:00:14
    The Black Box Micro allows you to make your own hidden camera. Put it anywhere and record up to 21 hours of covert video.

  • 4 Camera USB DVR Kit

    Updated: 2011-10-06 06:59:58
    Record and view 4 wireless cameras on your Windows PC, day or night. Includes software featuring alert notifications when motion is detected.

  • Door Alarm

    Updated: 2011-10-06 06:59:57
    This Wireless Door Alarm is an easy to install security device that can be attached to nearly any door or window. Install the wireless contacts using the self-adhesive pads to activate an ear-splitting alarm whenever the door or window is opened.

  • Brenda Moretto Blog Central

    Updated: 2011-10-05 22:54:36
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive October 2011 8 September 2011 35 August 2011 42 July 2011 33 June 2011 41 May 2011 43 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 404 Corporate 224 Enterprise 400 McAfee Labs 1100 Tags 1 million guarantee access to live fraud resolution agents Acquisition Android botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom

  • Nitro and Q1Labs Sold

    Updated: 2011-10-05 02:35:03
    McAfee to Aquire NitroSecurity.   IBM to aquire Q1Labs. Can anyone think of an example where a big company bought a smaller security company and the product got better?  We could spend the reset of the day talking about products that became moribund or were abandoned altogether because some big company thought they were missing an important piece [...]

  • Tracy Ross Blog Central

    Updated: 2011-10-04 10:45:13
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive October 2011 2 September 2011 35 August 2011 42 July 2011 33 June 2011 41 May 2011 43 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 402 Corporate 223 Enterprise 397 McAfee Labs 1100 Tags 1 million guarantee access to live fraud resolution agents Acquisition Android botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom

  • Kendall Fishman Blog Central

    Updated: 2011-10-04 01:08:34
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive October 2011 2 September 2011 35 August 2011 42 July 2011 33 June 2011 41 May 2011 43 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 402 Corporate 223 Enterprise 397 McAfee Labs 1100 Tags 1 million guarantee access to live fraud resolution agents Acquisition Android botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom

Current Feed Items | Previous Months Items

Sep 2011 | Aug 2011 | Jul 2011 | Jun 2011 | May 2011 | Apr 2011