Quantcast
Channel: Simon Hunt – McAfee
Browsing latest articles
Browse All 48 View Live

Image may be NSFW.
Clik here to view.

Spring Cleaning Time – What to know When Buying and Selling Used Devices

image: Tech News Daily Spring is in the air; it is the traditional time to clean house, tidy away things you don’t use, and for us geeks, time to dispose of all the old, tech gadgets that we’ve...

View Article



CES2015 – A festival of uncontrolled IOT and Smart devices.

The Internet of Things (IOT) and “smart devices” were THE big thing at CES this year – the show was flooded with novel gadgets from every manufacturer – from smart connected coffee makers, health...

View Article

Understanding Internet Of Things for the Home

Last week Rory Cellan-Jones, a reporter for the BBC, tried to explain in his CES2015 news article why we, all of us, should be interested in the progress of “Internet of Things” (IoT) for the home....

View Article

Five Things I Don’t Like About Cloud Security for Homeowners (and One Thing I...

For a while now I’ve been working to define an architecture for securing homes from cyber threats – not just your PC or Mac – we have that covered with our award winning products – I’m worried about...

View Article

Smart Home, or Dumb Home/Smart Cloud?

At the end of my street, tucked between some bushes and a tree in someone else’s garden, is a weathered beige box. I’d never noticed it before this week, but it’s become very important to me, because...

View Article


10 Things You Don’t Want To Know About Bitlocker

With the forthcoming release of Windows 7, questions about “Bitlocker” are coming up again. For those of you who were around during the original release of Bitlocker, or as it was known then “Secure...

View Article

Vulnerability in Some Secure USB Sticks

Recently a slew of news sites announced a newly discovered vulnerability (care of the German Security firm SySS) on a range of supposedly “secure” consumer USB sticks. With the right tools and...

View Article

Eugene School Leaks “Potential” 26,000 Records

This week, datalossdb.org reported the first major suspected PII breach of the year, reported by George Russel, Superintendant of the Eugene School District of Oregon. Apparently some suspicious...

View Article


TPM "Undressed…"

Recently it was announced (http://abcnews.go.com/Technology/wirestory?id=9780148&page=1) with much fanfare that the now-ubiquitous “TPM” chip found in most modern computers had been hacked. This...

View Article


HITECH Name-And-Shame Goes Up A Gear

Not content with naming-and-shaming companies who break the HIPAA/HITECH health regulations through the normal press, The U.S. Department of Health and Human Services is now reporting companies who...

View Article

Bitlocker/Truecrypt Decryption Tool

Following on from my post “10 Things You Don’t Want To Know About Bitlocker”, “TPM Undressed” and “Firewire Attacks Revisited” it recently came to my attention that Passware, Inc. A feisty California...

View Article

Image may be NSFW.
Clik here to view.

Data Protection – Where to Start

One common question I get asked when I speak on Data Protection, is “what do I do first?” It’s interesting topic because although my presentation is exactly about what most people should do, and in...

View Article

New China Encryption Rules Won’t Pose Headaches for U.S Vendors?

This week, Jaikumar Vijayan at Computerworld posted an interesting article about new Chinese rules designed to control the import of non-domestic encryption products. Many people have infered that...

View Article


Image may be NSFW.
Clik here to view.

Insight Into Benelux IT Security Priorities

Last month I was invited to speak at our Executive Summit in Amsterdam, where 100 or so CIOs, CEOs and other executives from the Benelux area came to hear what McAfee was up to, and tell us where we...

View Article

Two Gulf States to Ban Some BlackBerry Functions

Following on from a failed state-wide “hack” of the Blackberry system, where the state-controlled telco etisalat tried to distribute a “performance enhancing patch” to Blackberry users (which turned...

View Article


McAf.ee – Create Secure Short URLs…

A pet project of mine for a couple of months now, McAfee’s secure-short URL service  http://mcaf.ee went through a viral launch last week and has taken flight! Leveraging McAfee Global Threat...

View Article

Web 2.0 Technologies Can Be Used Effectively for Business

We’ve just released a new report, along with researchers from Purdue’s CERIAS group, on the use of Web 2.0 and social networking technologies in business.  Researchers surveyed of more than 1,000...

View Article


About Spam Sites, Malware and Heated Lunchtime Conversations

This last week we’ve been having some heated (but friendly) discussions between the McAf.ee team and the Global Threat Intelligence teams. The problem we’ve been discussing is quite interesting – it’s...

View Article

Image may be NSFW.
Clik here to view.

Click Here to See Fluffy Kittens (or Get Malware)…

Following on from my last post where I was talking about efforts we were putting in place to stifle the use of the http://mcaf.ee secure short URL provider by spam merchants, I thought I’d share with...

View Article

Got (wiki)Leaks? Call a McAfee (DL)Plumber…

With the current news fracas regarding the latest WikiLeaks disclosures, which have reached a pretty interesting juncture with Congressman Peter King asking for WikiLeaks and it’s founder Julian...

View Article

Image may be NSFW.
Clik here to view.

Decrypting Civil War Messages..

Over the holiday break an interesting story broke on a US Civil War message being finally decrypted after 147 years. The message was in a bottle that had been stored in a Virginia museum since 1896,...

View Article


Improving Security On Solid State Drives

Well, One week into the Intel/McAfee relationship and I am pleased to say it’s already bearing fruit. Over the last few days I’ve been reaching out to all my Intel peers, making the connections with...

View Article


Underground Economies – The rise of Intellectual Capital Theft.

By now I hope readers have seen our latest report – “Underground Economies” where McAfee and SAIC collaborated to investigate perceptions around intellectual capital – the “secret sauce” of companies....

View Article

Net Giants Challenge French Data Law

An interesting story broke this week on BBC News and other sites regarding the Association of Internet Community Services (ASIC) in France starting a legal challenge against a new French law passed on...

View Article

Mobile Device, Or Not? That Is The Question

For the last couple of weeks I’ve been presenting around the U.S. at events such as Secure360 in St. Paul, and the McAfee Executive Summits in Boston and New York. One question I was asked at every...

View Article


Image may be NSFW.
Clik here to view.

Take Two Of These Pills And Call Support In The Morning…

“McAfee launches a range of pharmaceutical anti-viral medications to thwart the growing problem of Biological computer viral attacks”   Sounds far fetched? Maybe not given that researches at Caltech...

View Article

Piggybacking WiFi at 60mph…

I was in Madrid speaking at a conference a couple of months ago, and arriving after one of my favorite trans-Atlantic flights (you know the ones, where the ratio of screaming children to adults is not...

View Article

Image may be NSFW.
Clik here to view.

15 Minutes with… David O’Berry

Welcome to “15 minutes with” – an occasional contribution between myself and the movers-and-shakers within McAfee’s technical community. This week on the stand is my good friend and occasional...

View Article

15 Minutes With… Ben Andrew

Welcome to “15 minutes with” – an occasional contribution between Simon Hunt, CTO Endpoint Security and the movers-and-shakers within McAfee’s technical community. This week on the stand is Ben Andrew,...

View Article



Image may be NSFW.
Clik here to view.

Evil Twitter… Finding malware amongst the maelstrom..

Would it surprise you to know that yesterday, more than 5000 tweets were posted with URLS which would have dropped you on sites which distribute malware? It was only a small portion of the total number...

View Article

Security Precautions and Best Practices for ANY Border Crossing

Recently, the New York Times wrote an article titled “Traveling Light in a Time of Digital Thievery.”  The article focused on China, and the precautions that some executives take when traveling to that...

View Article

Dump IE? Is that really the best advice?

With the news of the latest zero-day exploit for IE gaining press around the globe, there seems to be increasing coverage that “security experts” are advising users to stop using Internet Explorer...

View Article

Image may be NSFW.
Clik here to view.

From Tourist Information to Malware in one easy step…

This week BBC News and others reported that Gibraltar is joining another well known destination, Monmouth UK, by tagging locations around the country with printed 2 dimensional bar codes (QR Codes)...

View Article


Image may be NSFW.
Clik here to view.

The Connected Home – Introducing Little Red Boxes…

This will be old news to those of you who took the time to visit McAfee Focus 2012 , but for the rest – my team took the opportunity to introduce the concept of the McAfee “Little Red Box” in the...

View Article

Decrypt Full Disk Encryption products for $299 – Well, it got cheaper at least

Many people have contacted my team and I over the last few days about the recent announcement by ElcomSoft, that they offer a tool to decrypt Bitlocker, PGP and Truecrypt volumes. This $299 tool is...

View Article

Dear Customer – Turn on the protection features you bought please?

The recent press activity around the New York Times Cyberattack, and the response from their vendor are causing quite a stir in the malware protection community – so much in fact that some journalists...

View Article


Travelling Secure with Electronic Devices

This week, Tara McKelvey from BBC News Magazine again reminded us that government agents at borders are universally allowed to inspect, and in most cases detain our possessions as we enter countries –...

View Article

Browsing latest articles
Browse All 48 View Live


Latest Images