Cameron Diaz has gone from being just another one of Charlie’s Angels to the most dangerous celebrity on the Web, according to research by McAfee. In the latest version of its “Dangerous Celebrities” study, McAfee found that Diaz had replaced fellow actress Jessica Biel as the celebrity who, when entered into search engines, was most […]
Intel has signed a definitive agreement to acquire security giant McAfee for approximately $7.68 billion. If completed, McAfee would become a wholly owned subsidiary of Intel and would report to Intel’s Software and Services Group. For Intel, bringing McAfee into the fold continues with the company’s plans around software, explained Ren??«e James, Intel senior vice […]
News that Intel has agreed to buy McAfee for $7.68 billion generated some mixed reaction from industry analysts Aug. 19. While officials at both companies touted how the integration could allow them to integrate security more deeply into Intel’s portfolio, others questioned whether the deal is a good fit. “If Intel wants to grow the […]
Malware spreading via USB devices is not a new phenomenon, but it is still effective. According to McAfee’s 2010 Q2 Threat Report, the most widely detected threat was the Genericlatr Trojan, AutoRun malware found on nearly 9 percent of machines scanned by the company worldwide. Then there is Stuxnet, Conficker and other malicious threats that […]
Network Solutions reported today that a mass compromise of parked domains belonging to their customers affected significantly less domains than previously thought. Last week, researchers at Armorize Technologies discovered an infected widget that was serving malware to people who visited parked domains, which are domains that are registered but lack any owner-provided content. While Armorize […]
Adobe Systems announced that on Aug. 19 it will patch a flaw in Reader revealed at the Black Hat security conference in an emergency update. The update will cover critical bugs affecting Adobe Reader and Acrobat, including one revealed by Charles Miller, principal security analyst with consulting firm Independent Security Evaluators, at the conference last […]
Hewlett-Packard has agreed to acquire Fortify Software to add another layer to its application security portfolio. The terms of the deal were not disclosed. According to HP, the acquisition of Fortify will allow HP to help organizations meet compliance regulations and bolster security by integrating security assurance into the development lifecycle. “Businesses operate in a […]
Security researchers are sending up a flare to warn Google Android users about a video game that can be used to track and monitor their movements. The application, known as Tap Snake, is a version of a 1970s video game called “Snake.” According to researchers at F-Secure, Tap Snake is a client for a commercial […]
After months of controversy, federal authorities said they do not plan to press charges against Pennsylvania school officials for allegedly spying on a student via Webcam. In a statement today, U.S. Attorney Zane David Memeger said there was insufficient evidence of criminal intent to charge officials in the Lower Merion School District. The district has […]
A bug in the Firefox browser that can be used to bypass an alert for obfuscated URLs is unlikely to trick users, according to Mozilla. The flaw was uncovered by Armorize Technologies researcher Aditya K. Sood, who warned it could be used by purveyors of malware to increase the chance of leading users to malicious […]