Skip the navigation

More Cybercrime and Hacking In Depth

Evan Schuman: Resurrection of Full Disclosure mailing list is great news, if you're not a cyberthief

The alternatives to an independent list like Full Disclosure can't match it for stopping new cyberattack tactics.

Security Manager's Journal: Stopping vendors from making us a Target

The data breach suffered by Target could make it easier for our manager to make some needed changes in his company's vendor management processes.

The new security perimeter: Human Sensors

Security Manager George Grachis discusses the current cyber threat landscape and why Human Sensors, our users, are our most underutilized resource that can make all the difference

Security Manager's Journal: Thousands of dollars in phone calls? Management hates that.

Problem arose after a consultant made a configuration change, opening up control ports to the Internet, with no authentication required.

Everything You Know About Enterprise Security Is Wrong

Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at this week's RSA Conference, you can't provide physical or electronic security simply by trying to prevent authorized access -- you have to rethink all types to security to protect data and lives.

How to Test the Security Savvy of Your Staff

How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.

McAfee Offers Global Response to Nationalized Malware

In medieval times, kings let barbarians break down the castle gates but made sure they paid the price once they got inside. McAfee's approach to security takes a similar approach -- since data breaches are inevitable, companies should worry less about the perimeter and more on catching the bad guys in the act.

Tech Industry Praises Cybersecurity Framework From White House

Leaders of the tech sector laud the Obama administration's rollout of voluntary cybersecurity guidelines, but broader private-sector adoption could remain a challenge.

Ira Winkler: 6 failures that led to Target hack

The storyline that a single point of failure allowed a sophisticated attacker to steal millions of card numbers from Target just doesn't hold up.

Security Manager's Journal: Cyberattacks just got personal

Recent data breaches suggest that retailers are security laggards, but the professionalism of the attacks should worry just about anyone.

McAfee Security Report Suggests 2014 Will Be a Rough Year

Smartphones, social networks, PCs, servers, cloud services, governments and national infrastructure all face security risks in 2014, according to the latest McAfee security report. On, and virtual currencies are being used to fund serious crimes. So, who wants a new career?

Security Manager's Journal: Target breach unleashes fresh scams

Scammers are nothing if not innovative. It just goes to show that the best defense is an educated workforce.

Target's security: Better than I thought

The way Target deployed triple DES encryption for debit card PINs makes its statement about the unlikelihood that they were in danger much more believable.

Target: Deceive first, answer questions later

Issuing deceptive statements is no way to win back customers' trust. That's a lesson for anyone who might find itself in Target's position someday.

Kenneth van Wyk: Target breach underscores how backward U.S. payment tech is

There's no good reason for the U.S. to be so far behind in adopting EMV.

Target's 'We've Been Breached' sale is a little cynicism for the holidays

A sale, right before Christmas? What an extraordinary step for a retailer to take! And that hefty 10% off is available to everyone. Target's millions of breach victims must be feeling very special.

Ron Miller: DRM has always been a horrible idea

And there's mounting evidence that it's counterproductive.

Malware: War without end

After decades of fighting off viruses, worms, Trojans and other malware and cyberattacks, total victory remains beyond reach.

McAfee Moves to Redefine SIEM, Enterprise Security

Most security information event management systems can identify threats, but they can't remove them. All this does is put a bull's eye on a CIO's back. McAfee's new Enterprise Security Manager takes that next step and shows enterprises how to respond to those threats.

'HoneyDocs' lays irresistible bait for hackers

Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.