Sharks and hackers have a lot in common. Both take bites – one out of fishy friends, and the other out of your data, your network, and in some cases, your personal brand. I’ve written about personal...
McAfee product coverage and mitigations for malware or indicators associated with the recent attacks (a.k.a. Dragonfly, Energetic Bear, Havex/SYSMain) on industrial control systems (ICS's) are listed below.
If the cyber theft of intellectual property attacks an organization’s ability to innovate, theft of business confidential information attacks its ability to execute as a business. Verizon’s 2014 Data Breach Investigations Report (DBIR) found that 22 percent of breaches are the result of cyber espionage attacks, and that the victims were in the public, professional […]
My last post illustrated the different facets of cybercrime and cyber espionage. Today, we dig deeper into the innovation costs associated with the theft of intellectual property. The most important area for loss is in the theft of intellectual property and business-confidential information—economic espionage. It is difficult, however, to precisely estimate these losses. This is […]
August may mean the last days of summer vacation and start of back to school for some, but for die hard NFL fans it also means the return of football (American football that is). And for many this also means the start of their fantasy football league. And though these fantasy teams are not real, […]
P.F. Chang’s China Bistro Ltd. said on Monday that it has contained an ongoing data breach, though an investigation is still underway. The company, which was first notified of a possible security problem in early June by the Secret Service, has been processing payments securely since June 11. The company confirmed today that card processing […]
In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else. Everyone else is fairly harmless. They enjoy their smartphones as they are, and, for the most part, lead fairly secure mobile lives. The same, however, cannot be said for jailbreakers—especially after one of the largest jailbreaking repositories for […]