Spring Cleaning Time – What to know When Buying and Selling Used Devices
image: Tech News Daily Spring is in the air; it is the traditional time to clean house, tidy away things you don’t use, and for us geeks, time to dispose of all the old, tech gadgets that we’ve...
View ArticleCES2015 – A festival of uncontrolled IOT and Smart devices.
The Internet of Things (IOT) and “smart devices” were THE big thing at CES this year – the show was flooded with novel gadgets from every manufacturer – from smart connected coffee makers, health...
View ArticleUnderstanding Internet Of Things for the Home
Last week Rory Cellan-Jones, a reporter for the BBC, tried to explain in his CES2015 news article why we, all of us, should be interested in the progress of “Internet of Things” (IoT) for the home....
View ArticleFive Things I Don’t Like About Cloud Security for Homeowners (and One Thing I...
For a while now I’ve been working to define an architecture for securing homes from cyber threats – not just your PC or Mac – we have that covered with our award winning products – I’m worried about...
View ArticleSmart Home, or Dumb Home/Smart Cloud?
At the end of my street, tucked between some bushes and a tree in someone else’s garden, is a weathered beige box. I’d never noticed it before this week, but it’s become very important to me, because...
View Article10 Things You Don’t Want To Know About Bitlocker
With the forthcoming release of Windows 7, questions about “Bitlocker” are coming up again. For those of you who were around during the original release of Bitlocker, or as it was known then “Secure...
View ArticleVulnerability in Some Secure USB Sticks
Recently a slew of news sites announced a newly discovered vulnerability (care of the German Security firm SySS) on a range of supposedly “secure” consumer USB sticks. With the right tools and...
View ArticleEugene School Leaks “Potential” 26,000 Records
This week, datalossdb.org reported the first major suspected PII breach of the year, reported by George Russel, Superintendant of the Eugene School District of Oregon. Apparently some suspicious...
View ArticleTPM "Undressed…"
Recently it was announced (http://abcnews.go.com/Technology/wirestory?id=9780148&page=1) with much fanfare that the now-ubiquitous “TPM” chip found in most modern computers had been hacked. This...
View ArticleHITECH Name-And-Shame Goes Up A Gear
Not content with naming-and-shaming companies who break the HIPAA/HITECH health regulations through the normal press, The U.S. Department of Health and Human Services is now reporting companies who...
View ArticleBitlocker/Truecrypt Decryption Tool
Following on from my post “10 Things You Don’t Want To Know About Bitlocker”, “TPM Undressed” and “Firewire Attacks Revisited” it recently came to my attention that Passware, Inc. A feisty California...
View ArticleData Protection – Where to Start
One common question I get asked when I speak on Data Protection, is “what do I do first?” It’s interesting topic because although my presentation is exactly about what most people should do, and in...
View ArticleNew China Encryption Rules Won’t Pose Headaches for U.S Vendors?
This week, Jaikumar Vijayan at Computerworld posted an interesting article about new Chinese rules designed to control the import of non-domestic encryption products. Many people have infered that...
View ArticleInsight Into Benelux IT Security Priorities
Last month I was invited to speak at our Executive Summit in Amsterdam, where 100 or so CIOs, CEOs and other executives from the Benelux area came to hear what McAfee was up to, and tell us where we...
View ArticleTwo Gulf States to Ban Some BlackBerry Functions
Following on from a failed state-wide “hack” of the Blackberry system, where the state-controlled telco etisalat tried to distribute a “performance enhancing patch” to Blackberry users (which turned...
View ArticleMcAf.ee – Create Secure Short URLs…
A pet project of mine for a couple of months now, McAfee’s secure-short URL service http://mcaf.ee went through a viral launch last week and has taken flight! Leveraging McAfee Global Threat...
View ArticleWeb 2.0 Technologies Can Be Used Effectively for Business
We’ve just released a new report, along with researchers from Purdue’s CERIAS group, on the use of Web 2.0 and social networking technologies in business. Researchers surveyed of more than 1,000...
View ArticleAbout Spam Sites, Malware and Heated Lunchtime Conversations
This last week we’ve been having some heated (but friendly) discussions between the McAf.ee team and the Global Threat Intelligence teams. The problem we’ve been discussing is quite interesting – it’s...
View ArticleClick Here to See Fluffy Kittens (or Get Malware)…
Following on from my last post where I was talking about efforts we were putting in place to stifle the use of the http://mcaf.ee secure short URL provider by spam merchants, I thought I’d share with...
View ArticleGot (wiki)Leaks? Call a McAfee (DL)Plumber…
With the current news fracas regarding the latest WikiLeaks disclosures, which have reached a pretty interesting juncture with Congressman Peter King asking for WikiLeaks and it’s founder Julian...
View ArticleDecrypting Civil War Messages..
Over the holiday break an interesting story broke on a US Civil War message being finally decrypted after 147 years. The message was in a bottle that had been stored in a Virginia museum since 1896,...
View ArticleImproving Security On Solid State Drives
Well, One week into the Intel/McAfee relationship and I am pleased to say it’s already bearing fruit. Over the last few days I’ve been reaching out to all my Intel peers, making the connections with...
View ArticleUnderground Economies – The rise of Intellectual Capital Theft.
By now I hope readers have seen our latest report – “Underground Economies” where McAfee and SAIC collaborated to investigate perceptions around intellectual capital – the “secret sauce” of companies....
View ArticleNet Giants Challenge French Data Law
An interesting story broke this week on BBC News and other sites regarding the Association of Internet Community Services (ASIC) in France starting a legal challenge against a new French law passed on...
View ArticleMobile Device, Or Not? That Is The Question
For the last couple of weeks I’ve been presenting around the U.S. at events such as Secure360 in St. Paul, and the McAfee Executive Summits in Boston and New York. One question I was asked at every...
View ArticleTake Two Of These Pills And Call Support In The Morning…
“McAfee launches a range of pharmaceutical anti-viral medications to thwart the growing problem of Biological computer viral attacks” Sounds far fetched? Maybe not given that researches at Caltech...
View ArticlePiggybacking WiFi at 60mph…
I was in Madrid speaking at a conference a couple of months ago, and arriving after one of my favorite trans-Atlantic flights (you know the ones, where the ratio of screaming children to adults is not...
View Article15 Minutes with… David O’Berry
Welcome to “15 minutes with” – an occasional contribution between myself and the movers-and-shakers within McAfee’s technical community. This week on the stand is my good friend and occasional...
View Article15 Minutes With… Ben Andrew
Welcome to “15 minutes with” – an occasional contribution between Simon Hunt, CTO Endpoint Security and the movers-and-shakers within McAfee’s technical community. This week on the stand is Ben Andrew,...
View ArticleEvil Twitter… Finding malware amongst the maelstrom..
Would it surprise you to know that yesterday, more than 5000 tweets were posted with URLS which would have dropped you on sites which distribute malware? It was only a small portion of the total number...
View ArticleSecurity Precautions and Best Practices for ANY Border Crossing
Recently, the New York Times wrote an article titled “Traveling Light in a Time of Digital Thievery.” The article focused on China, and the precautions that some executives take when traveling to that...
View ArticleDump IE? Is that really the best advice?
With the news of the latest zero-day exploit for IE gaining press around the globe, there seems to be increasing coverage that “security experts” are advising users to stop using Internet Explorer...
View ArticleFrom Tourist Information to Malware in one easy step…
This week BBC News and others reported that Gibraltar is joining another well known destination, Monmouth UK, by tagging locations around the country with printed 2 dimensional bar codes (QR Codes)...
View ArticleThe Connected Home – Introducing Little Red Boxes…
This will be old news to those of you who took the time to visit McAfee Focus 2012 , but for the rest – my team took the opportunity to introduce the concept of the McAfee “Little Red Box” in the...
View ArticleDecrypt Full Disk Encryption products for $299 – Well, it got cheaper at least
Many people have contacted my team and I over the last few days about the recent announcement by ElcomSoft, that they offer a tool to decrypt Bitlocker, PGP and Truecrypt volumes. This $299 tool is...
View ArticleDear Customer – Turn on the protection features you bought please?
The recent press activity around the New York Times Cyberattack, and the response from their vendor are causing quite a stir in the malware protection community – so much in fact that some journalists...
View ArticleTravelling Secure with Electronic Devices
This week, Tara McKelvey from BBC News Magazine again reminded us that government agents at borders are universally allowed to inspect, and in most cases detain our possessions as we enter countries –...
View Article