This week we’re heading to Colorado for the Aspen Institute’s annual Aspen Security Forum. I’ll be speaking on a Friday panel entitled “WMD: The Nightmare Scenario,” discussing the application of cyber-attacks against critical infrastructure such as water systems, power plants, the electric grid, and industrial systems such as chemical plants. Cyberspace is now widely acknowledged […]

Every inch of every page was filled front and back and the little gold lock kept the contents of my diary safe from prying eyes. I recorded every dream, fear, parental injustice, and teenage catastrophe in the pages of my very private, and always hidden, little blue book. But a lot has changed since then […]

Love is a powerful feeling that can cause an individual to do things they wouldn’t normally do—sometimes in a way that could compromise personal security. As we found in the Love, Relationships & Technology study released earlier this year, nearly 50% of people have shared or received intimate or sexual text messages, emails or photos […]

“Shadow IT” is stepping out into the light of day. Business users are eagerly embracing the cloud and especially Software-as-a-Service (SaaS) in search of cost-effective productivity tools for file sharing and storage, collaboration, social media, and anything else that makes them more effective on the job. But the problem is these well-intentioned, hardworking employees are […]

To say cyber threats are getting more advanced may be the understatement of the year.  Every minute, our 500-plus team at McAfee Labs learns something new about the behavior of malware and other types of network attacks.  The most commonly undetected threat these days is the advanced evasion technique (AET).  In the most basic terms, […]