Author Archives: Admin

MWC 2018: Digital and Mobile Security in the 5G IoT Era

Digital and Mobile Security

 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

Mobile World Congress 2018 is upon us and the big news includes the launch of a bunch of new devices, including the Sony Xperia XZ2 Compact, Samsung Galaxy S9, Sony Xperia XZ Premium 2 and Samsung Galaxy Tab S4.

In addition to these and dozens of other devices launching at this year’s event in Barcelona, we are seeing the acceleration of the trend for domestic and industrial smart devices, voice-controlled digital assistants and other internet of things (IoT) enabled smart devices.

Google, for example, is using MWC 2018 as a platform to publicise Google Assistant and the Google Home smart speaker, though one thing we still haven’t heard enough about are the many new security threats and issues surrounding new smart devices, digital assistants and IoT technologies.

Biometric Authentication, 5G Realities and IoT security

Another notable trend at MWC 2018 has been the focus from Samsung and some of the other major mobile players on improved forms of biometric authentication, with Samsung releasing a much-improved Iris Scanner as part of the new Galaxy S9 range.

It’s certainly a really positive move to see this focus on identity authentication at this year’s show, with a notable shift at this year’s event from the hype surrounding virtual and augmented reality and voice-controlled smart homes to far more realistic and practical concerns around security, biometrics and the real-world use cases of superfast 5G networking tech.

Much of the conversation around 5G, of course, is still dominated around how edge computing and low latency in 5G networks will actually translate into valuable and useable services for consumers and businesses alike.

These new 5G use cases dominated the IoT news at MWC 2018, with numerous exhibitors talking up their latest 5G IoT applications and concepts. And almost by default digital security has also become one of the hottest topics in Barcelona this year, as small developers and the major multinational mobile brands alike wake up to the fact that security is of paramount importance across the entire IoT supply chain

Evolving Digital Security for the 5G IoT Era

Firms are realising that their digital security strategy has to evolve at the same pace as the many new developments in the current buzzword bingo card such as 5G IoT, artificial intelligence (AI) and machine learning.

Failure to undertake the appropriate due diligence in these new emerging technologies open them up for significant penalties when the inevitable data breaches occur.

In addition to the focus on improving mobile handset security and raising awareness of digital security issues in the smart home, the onus for 5G network level security really needs to shift back to the telecommunications companies themselves.

The 5G Security Challenge for Telecoms

The bottom line is this: the security of 5G networks presents a fundamental challenge to the telecommunications industry at large. Something that the hype machine surrounding 5G at MWC 2018 generally fails to highlight, for obvious reasons!

The promise of 5G-enabled services in smart cities, connected cars and across the burgeoning e-health sector, for example, is clear. Yet the fact that network-wide security and security across the IoT value chain is fundamental to these types of applications and services operating safely is still too often overlooked.

Driverless cars, smart surgery and IoT applications across the manufacturing sector are good examples to cite, where digital security is crucial.

All of which is why we as an industry have to work better together – from digital security specialists through to 5G IoT app and hardware developers through to the multinational telecommunications companies themselves – to ensure that we are doing all we can to meet the security challenges and the many increasingly sophisticated attacks that are sure to come in the 5G era.

Source : : Blog

Key Mobile Threat Takeaways from the 2018 Mobile Threat Report


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

The term “mobile” has come to encompass a wide range of devices these days. Mobile devices have become much more than our Androids and iPhones. Wearable watches, tablets, even home devices all fall under the mobile umbrella of IoT and have the ability to impact our lives for better, or for worse.

This rich IoT landscape holds the key to your digital identity, your connected home and potentially, even your kid’s digital future. Gartner predicts that by the year 2020, 20.8 billion connected devices will populate the consumer home – that’s roughly five times greater than the Earth’s projected population at that time! As these devices continue to increase in presence in our daily lives, it’s important to understand not only the convenience they offer, but the threats they pose as well.

With the dawn of an even more connected era fast approaching, we at McAfee are examining the mobile threats that might be waiting on the horizon. This year’s Mobile Threat Report, takes a deep dive into some significant trends that demonstrate just how these mobile platforms are targeting what’s most sacred to us – our home. Let’s take a look into some of the most common trends in mobile malware, and a few tips on how to protect your home.

Mobile Malware in the IoT Home  

According to Gartner, 8.4 billion connected “things” were in use last year, and chances are one or more of these devices is living in your home today. While many of these devices bring convenience and ease to the home, it’s important to note that they also significantly increase the risk of attack. Many of these devices are developed with innovation in mind, and little to no focus on – security. With that being said, everyday users of mobile devices have grown phenomenally, hence the increased need for security as the frequency of mobile attacks continues to grow.

DDoS Causes SOS  

IoT attacks such as Mirai and Reaper showed the world just how vulnerable smart homes and connected devices can be to malicious code. These attacks targeted millions of IoT devices with the intent of creating a botnet army from trusted connected items within the household.

The Mirai malware authors, leveraged consumer devices such as IP cameras and home routers to create a botnet army, launching distributed denial of service (DDoS) attacks against popular websites. By taking advantage of the low-levels of security on most home connected devices, this malware was able to seize control of millions of devices. All it had to do was guess the factory default password.

The “Reaper” malware strain also took advantage of limited security of many connected home devices. However, these malware authors evolved their tactics by looking for devices with known vulnerabilities to exploit and by implementing a set of hacking tools that showed greater sophistication. The IoT reaper clocked in as many as 2 million infected devices, at nearly ten times the rate as Mirai.

The evolution of the malicious code targeting mobile and IoT devices represents a growing threat to consumers who wish to embrace a culture of connected living. So how can we welcome these devices into our homes without opening the door to cyberthreats? Here are a few tips to consider:

  • Protect your devices, protect your home. As we continue to embrace a culture of smart homes and connected devices, it is also important for us to embrace internet security at a network level. With the presence of targeted attacks growing globally, we must remain vigilant in protecting our connected lives by making sure each individual device is secure, especially the home network. The MTR has dubbed 2018 as “The Year of Mobile Malware,” and very tech user should consider using a home gateway with built-in security to ensure every device in their home is protected.


  • Download apps with caution and update them regularly. Malware campaigns having been targeting users on the Google Play stores almost since its inception. In fact, McAfee recently discovered Android Grabos, one of the most significant campaigns of this year, found present within 144 apps on Google Play. Stay current on which applications are supported in your application store and update them regularly. If an app is no longer supported in the play store, delete it immediately.


  • Invest in comprehensive security. I can’t stress enough how important is to use comprehensive security software to protect your personal devices. Malware is constantly evolving with technology, so ensure your all of your devices are secured with built-in protection.

Source : : Blog

Is Your Teen Using Tinder? Here’s What You Need to Know


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

These are just a few reasons many teens are exploring Tinder these days, the dating app popular in the twenty- and thirty-something crowd.

While Tinder isn’t new (launched in 2012), app trends among teens change constantly, and this is a recent one. We’ve got a lot on our digital radar as parents but apps that match (underaged) users within a defined geographic area get popular, it quickly shoots to the top of our radar. So, let’s take a look.

What’s the Big Deal

Tinder allows users 18 and over to register for nearby “matches” but because Tinder links to Facebook accounts for verification, underage users can easily input a false birthdate to circumvent the rules.Teens on Tinder

To tweens and teens, chatting with people nearby sounds fun, but to parents, the app opens the door to anything from pedophiles to bullies to stalkers to abuse. From a parent’s point of view, when the dating pool widens, so too do the risks. High school students are not immune from abuse. In fact, according to, every year, approximately 1.5 million high school students nationwide experience physical abuse from a dating partner; one in three adolescents in the U.S. is a victim of physical, sexual, emotional or verbal abuse from a dating partner.

Tinder allows users to connect three main social accounts: Spotify, Instagram, and Facebook, which can easily put personal information into the hands of the wrong people. Users are also encouraged to give the name of their High School and their workplace to further refine matching.

Emotional Risks

While our first thought is physical danger, using dating apps too early also threatens a child’s emotional health and confuses their still-developing social and interpersonal skills.  The risk of heartbreak, betrayal, and emotional abuse can be devastating for kids who aren’t ready to date — let alone wisely discern an endless pool of possible matches.Teens on Tinder

Too, there’s no shortage on Tinder of teens making it clear that they are just looking for a “hookup” or a “good time.” So, allowing tweens into that arena before they are ready can carry huge emotional and physical consequences.

Worth Distortion

Dating apps can also distort your child’s understanding of a worthy partner and reinforce looks-based relationships. If choosing a mate is as natural as swiping left (don’t like) and swiping right (like), then the hope of someday meeting “the one” could become a whole lot more difficult, if not impossible. And how much easier can your child’s uniqueness and worth be overlooked with just a swipe? Using dating apps before you are ready is an emotional wreck waiting to happen.

Under 18 

Monitor apps. Check your child’s phone for the Tinder app icon (see below). Don’t forget: Kids hide apps behind vault apps that may look like a game, a calculator, or a safe. So, do some clicking. If you discover your son or daughter is using Tinder ask them why and have them walk you through how they use it personally. Discuss the reasons against using the app, listen to their reasoning, decide on a family plan moving forward. If they are under 18, consider having them delete the app.

Tinder app icon.

Factors such as age and maturity will, no doubt, affect every family’s dating app plan. My daughter is almost 18, a high school senior, and heading to college in a blink. So, my conversation will be dramatically different from the parent of a 13-year-old.


Discuss the bigger picture. In a swipe right culture, values can quickly vanish. If you allow your child to date, discuss his or her relationship values. What makes a person attractive? What character traits do you desire? What expectations do you have of a relationship?

Over 18

Look beyond profiles. Advise your teen to do some sleuthing and look beyond a person’s Tinder profile for red flags revealing inconsistencies in truthfulness and character. Tinder warns: “Bad actors often push people to communicate off the platform immediately. It’s up to you to research and do your due diligence.”

Set up ground rules. Face-t0-face meetings with a stranger outside of Tinder (or any online platform) should be in a public location. Your child should always drive his or her vehicle and have their phone fully charged. Make sure inform you of who they are meeting with and where.

Reality Check

Kids establishing online friendships is here to stay. Some of your child’s best friends will likely be found online. Dating apps aren’t “bad,” but people can be careless and abusive when using them. And, using dating apps under 18, as many kids are doing today, only invites premature risk.

Remember, a digital connection may not have been the way you met friends or love interests in your day, but it’s a natural channel today. Be open to the social shift but equally alert and willing to exercise full-throttle parenting to keep your kids safe.

Source : : Blog

How McAfee is Adapting to the Mobile Landscape with New Partnerships and Innovation


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

Mobile World Congress (MWC) 2018 is finally upon us, and mobile and security providers from around the world are in Barcelona presenting the latest and greatest insight and innovation. At this year’s MWC, McAfee is excited to present our own unique insights and innovations, some of which are supported by our partners. These include: the 2018 McAfee Mobile Threat Report, our industry partnerships with Samsung, Telefónica, Türk Telekom, NTT DOCOMO, and McAfee Secure Home Platform Skill for Amazon Alexa.

Insight on the changing mobile landscape

Your phone is not just a phone. It is a rich computing environment that contains the keys to your connected life. And as the 2018 McAfee Mobile Threat Report reveals, cybercriminals know that, and are tailoring their strategy to our dependency on our mobile devices. The report aims to provide insight on the explosion of mobile malware and dramatic changes to the mobile landscape. The report also tells us that there have been over 16 million infestations detected in the third quarter of 2017 alone – nearly double the number from last year.

Partnerships that strengthen our customers’ security

The ever-changing mobile landscape is precisely why we’re working with our partners to find new ways to secure our customers’ mobile devices and digital lives. McAfee is today announcing key partnerships to ensure security is built-in across devices and networks. It’s more important than ever that the entire ecosystem works together to protect consumers around the world from these attacks and deliver them peace of mind. So, how exactly are we doing this? For starters, our partnership with Samsung has expanded to safeguard all Galaxy S9 smartphones, the Galaxy Note8, along with Samsung smart TVs, PCs and notebooks. We also announced a partnership with Telefónica, which will help protect Telefónica customers, and provide always on protection for every connected device in the home. We also announced a strategic partnership with Türk Telekom to deliver cross-device security protection. What’s more – NTT DOCOMO and McAfee now have an extended partnership in order to deliver Wi-Fi protection and security to NTT DOCOMO mobile users.

Adapting to Alexa

As we know, the growing type and number of connected devices has changed the way security operates – which is why our team created McAfee Secure Home Platform in the first place. But now, we’re excited to announce the planned launch of the new McAfee Secure Home Platform skill for Amazon Alexa, one of the most popular connected devices out there today. Customers with a McAfee Secure Home Platform enabled router can easily manage their connected home’s network security using their voice.

We’re excited to see what’s to come for the rest of MWC, and how these announcements will help improve our customers’ lives. With these new innovations, we hope our 400 million customers can live their digital lives with confidence and comfort.

Source : : Blog

Why is the Technology Industry Shirking its Security Responsibilities?


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

No sooner have we had time to recover from the post-CES jet-lag in January than Mobile World Congress 2018 rolls around. These two events have cemented themselves into the mobile and consumer technology industries’ calendars as key opportunities to showcase the latest hardware and software products and services, amidst a flurry of media hype and eager expectation from early adopters worldwide. So what’s in store for the technology industry and its eager consumers in 2018?

If anything, CES this year was a little flat, with little to see in the way of real innovation. This year’s show was a year of ‘iteration’ not ‘innovation’, particularly in the IT security industry, where the conversation at the show was dominated by promises of ‘security by design’ but no real demonstration of this. I was personally very interested to find out more about the latest smart safe that was unveiled at the show, billed as “a smarter way to keep valuables safe”.

Here was a new IoT device that, if anything, surely had to have the best digital security baked into it by design, no?

Unfortunately, that particular internet-connected safe turned out to be something of a damp squib, mainly because it proved to be incredibly easy to crack open. One BBC Tech reporter reported a worrying error that failed to trigger a theft alert. We simply banged on the top of the safe and it opened. What is more remarkable is that this vulnerability is well known,  I had an issue with a smart safe of my own when the battery ran out and of course I lost my key.  One quick search on YouTube revealed banging on the top of the safe would work, and guess what… it actually did! So much for ‘digital peace of mind’…

That’s merely one example of a slightly broken product that clearly needs a little more development before it hits the market. But that single widely-publicized security snafu was, unfortunately, tellingly symptomatic of an industry-wide trend of shirking responsibility for consumers’ digital (and physical) security.

All too often, digital and mobile security is still considered to be an afterthought, by hardware manufacturers and software developers alike, which is simply no longer viable. Particularly given the context of the increasing number and sophistication of cyber-attacks on mobile devices. See, for a very good example of this, the results of McAfee’s latest Mobile Threat Report 2018 – to be released at MWC 2018 – which reveals an explosion in mobile malware and dramatic changes in the mobile landscape over the last year.

If smartphone manufacturers genuinely wish to charge consumers in excess of £1000 for handsets, and provide finance plans to fund them then simply put, we need to know they are trustworthy. Shifting the blame onto the user, rather than building adequate methods of prevention into our business models is not acceptable.

So onto Mobile World Congress 2018 in Barcelona this year, we will be making some major announcements regarding a number of strategic partnerships with some of the world’s telecoms giants, designed to keep mobile users and the data on their increasingly number of smart devices safe, both in the home and on the go.

After all, it’s not that flash £1000 phone in your pocket that the real cybercrimals are after. It’s the data that’s stored within it, that can potentially give them complete access to your bank account, your confidential business data and more. And as the number of devices we have in our homes, our bags, our cars and our offices continues to proliferate, so does the number of attack vectors that cybercriminals can use to fraudulently obtain money.

Source : : Blog

A Model for Human and Machine Interaction: Human-Machine Teaming Grows up


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

Security operation centers (SOCs) are struggling to keep up with attackers, and artificial intelligence (AI) has failed to deliver significant improvements. The industry has been successful at applying AI to malware detection and user and entity behavior analytics (UEBA) using deep neural networks and anomaly detection. But other core SOC jobs such as monitoring, triage, scoping, and remediation remain highly manual. Some repetitive and low-value tasks can be assisted with automation, but tasks that require analysis and creativity are hard to capture in code. Even worse: Imagine trying to automate the investigation of an undiscovered attack technique.

Automation and current AI solutions depend upon a human observing and understanding a threat, then building a model or writing code. The time gap between the human observing a phenomenon and the machine helping is the reason why attackers often have the upper hand. In order to get ahead, we need to make AI systems learn and interact directly with practitioners at the SOC.

The idea behind human-machine teaming (HMT see [1] and [2]) is to put the human in the AI algorithm loop. In a SOC context, the human has the intuition to find a new attack technique and the creativity to investigate it using company tools. Using human input, the machine gathers information and presents it back in a summary to manage the human cognitive workload. As a result of the human-machine interaction, the machine learns to better proceed in new scenarios, while the human continues to adapt, focusing on higher-value tasks.

Several products put the human in the loop, but few empower the human to perform high-order cognitive tasks.

Research shows that unsupervised anomaly detection can be improved by asking the human to examine alerts when classification confidence is low. This approach improves detection by 4X and reduces false positives by 5X [3]. More importantly, the system teaches itself to address adversaries’ changing tactics.

Our assessment of the current SOC tools landscape shows that several products put the human in the loop, but very few empower the human to perform high-order cognitive tasks. In order to understand where we stand as an industry and what the gap is, we clustered tools into four groups.

Most cybersecurity products today deliver HMT1 and HMT2 capabilities. McAfee Investigator delivers HMT3 and our engineers are working toward HMT4.

On the vertical axis, we have ascending levels of cognitive tasks that humans bring to the team, while on the horizontal axis we have machine capabilities. An assumption of this model is that a human is not able to exercise high-order tasks if she also has to perform low-level functions. This is similar to a Maslow pyramid psychology model. As the machine starts to interact with the human at a higher level of cognition, the team becomes more effective and the degree of human-machine teaming increases from HMT0 to HMT4.

Most of the products in the industry today revolve around the first two iterations of human-machine teaming, known as HMT1 and HMT2. In these scenarios, humans interact with products by analyzing data and providing explicit orders on how to drill down and gather additional data. In some products, humans are able to elevate their work by getting insights and applying their intuition and context to them.

What is clearly missing are products that can take directional feedback, for instance: “Get me evidence that supports potential lateral movement on this case”. We are also missing products that can learn by  observing the human at work, for instance, learning to dismiss the alerts that humans have investigated and dismissed in the past.

At McAfee we are using this HMT maturity model as a guide to building better features and tools for the SOC. We recently launched McAfee Investigator [4] to help triage alerts faster and more effectively. Investigator, which uses a question answering approach to leverage expert knowledge [5], can take directional feedback from the human to pivot an investigation (HMT3). Our goal is to develop Investigator to a point where it can learn directly from practitioners (HMT4).

Learn more about human-machine teaming here.

[1] S. Grobman, “Why Human-Machine Teaming Will Lead to Better Security Outcomes,” 13 July 2013. [Online]. Available:

[2] B. Kay, “News from Black Hat: Humans Collaborate and Team with Machines to Work Smarter,” 25 July 2017. [Online]. Available:
[3] K. Veeramachaneni, I. Arnaldo and V. Korrapati, “AI^2 : Training a big data machine to defend,” IEEE 2nd International Conference on Big Data Security on Cloud, 2016.
[4] “McAfee Investigator,” [Online]. Available:
[5] F. M. Cuenca-Acuna and I. Valenzuela, “The Need for Investigation Playbooks at the SOC,” 2017. [Online]. Available:
McAfee does not control or audit third-party benchmark data or the websites referenced in this document. You should visit the referenced website and confirm whether referenced data is accurate.
McAfee technologies’ features and benefits depend on system configuration and may require enabled hardware, software, or service activation. Learn more at No computer system can be absolutely secure.

Source : : Blog

To See Mugshots of Today’s Bank Robbers, Look at a World Map


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

In Depression-era America, bank robbers John Dillinger, Baby Face Nelson, and Pretty Boy Floyd were household names. Newspapers detailed their heists, radios narrated their getaways, wanted posters plastered their mug-shot scowls from coast-to-coast. Every detail of their bank robberies and personal lives was seized upon, scrutinized, circulated, and discussed.

Eight decades later, bank robbery is a digital, systematic crime practiced – with methods constantly improved – by organized syndicates. The stubbled faces of Dillinger, Nelson, and Floyd have been replaced by shapes on the world map tracing the borders of Russia, North Korea, and Iran. A former NSA Deputy Director said publicly in March that “nation states are robbing banks.”

A 2015-16 campaign stole hundreds of millions of dollars from banks in the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network. SWIFT network banks in. That campaign, which targeted developing countries, was linked to the North Korean Reconnaissance General Bureau (RGB), security analysts believe.

In 2017 North Korean hackers targeted at least three South Korean cryptocurrency exchanges, capitalizing on Bitcoin’s anonymity to circumvent international sanctions. The Pyongyang University of Science and Technology has begun offering its computer science students classes in Bitcoin and blockchain.

The best cybercriminals in the world live in Russia, where they are largely immune from prosecution. For instance, one of the cybercriminals who hacked Yahoo at the behest of Russian intelligence services, compromising millions of accounts, used the stolen data for spam and credit card fraud for personal benefit. Iran’s DDOS attack on leading U.S. banks exemplify its coercive strategy to exert influence through disruption and destruction.

Hackers in these countries, whether affiliated with the state or not, account for much of the cost of global cybercrime. The latest strategy of their sophisticated operations is to target the “seams” between well-defended networks, exploiting weak points in the global financial network to pull off massive heists and in some cases further their national rhetoric.

To combat these operations, major international financial institutions are investing in defense, better fraud prevention, and transaction authentication. One report says that banks spend three times as much on cybersecurity as non-financial institutions to fight what has become a systematic risk to financial stability.

In the 1920s and ‘30s, the world sat back and watched John Dillinger, Baby Face Nelson, and Pretty Boy Floyd do their dirty work as the FBI slowly closed in. We can’t do that today. Governments, financial institutions, companies with banking records, and anyone with an ATM card should be invested in stopping financial cybercrime.

Banks have banded together to share information in near real time in order to protect the stability of the broader electronic financial system on which the world economy to heavily depends. Ultimately, they have determined that no one organization can go it alone with faced with such organised and well-funded adversaries. With the stability of the global financial system in play, unprecedented collaboration has become the new norm

We at McAfee embrace the same spirit by building all of our technology to facilitate the sharing of critical data across hundreds of technology partners. It appears sharing and collaboration will be the only way to counter this new breed of adversary and no one can go it alone anymore. The banks are leading  the way in this new reality of Together is Power.

Source : : Blog

MWC Preview: Tailoring Security to the Modern Connected Lifestyle


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

In 2018, we’re officially living in the “future” imagined by popular 80s movies. No, we still don’t have flying cars, but what we do have is many unique internet-connected devices. These devices can do it all – track our fitness, turn our lights on and off, allow us to live in a virtual reality – the list goes on. Even our mobile devices have become multi-purpose, giving us the ability to stay in touch with loved ones in a multitude of ways. So, as we’re about to enter the biggest collection of mobile innovation, Mobile World Congress (MWC), let’s take a look at the current state of the connected lifestyle, and the important role security plays in it.

The modern connected lifestyle

Looking back at the takeaways from last year’s MWC, it’s clear providers are tailoring mobile devices to our modern needs. Specifically, they designed new and improved features in order to meet those needs, including: high-quality photography, waterproof hardware, and improved charging capabilities and battery. The same goes for IoT devices – manufacturers are creating more personalized and advanced products in order to keep pace with how we live our lives in 2018. And the trend has seen traction amongst consumers, as users are practically glued to their devices now more than ever and live a completely connected lifestyle these days. What’s more – entire ecosystems will be connected as well with 5G just around the corner, making it clear this trend shows no signs of slowly down.

Protecting what matters

So, as we embrace our digital future, it’s important that we ensure our online activity and personal data stays secure. We’ve seen the threats coming after our devices adapt and become more advanced – some transform hundreds of apps into trojanized versions of themselves, others infect our devices only to enslave them into a botnet army. That’s why at this year’s MWC, McAfee is excited to display how we plan on protecting the ”connected everything” world we live in.

McAfee and our partners aim to keep our 400M+ customers safe in this modern age by recognizing that security is more than just anti-virus. Whether you’re at home, work, or on the go, your personal information will be safeguarded by solutions that will help keep you safe online and allow you to enjoy your ‘digital life’ to the max. Mind you, we can’t do it alone – as our partners, such as Samsung and Telefonica, share our belief that security needs to be built in from the start​, and support us in our mission to secure the entire digital lifestyle.

To discuss how we’re achieving this even further, McAfee CEO Chris Young will be a keynote speaker at this year’s MWC. He will be exploring how the digital economy is catalyzed by the rapid proliferation of mobile technologies in the hands of billions of people, and how this growth will continue to transform how we do business.

So, whether you’re headed to MWC or just watching from afar, be sure to stay tuned to learn more about McAfee’s mission to secure  the digital future. And, of course, stay on top of the latest consumer and mobile security threats by following me and @McAfee_Home on Twitter, listening to our podcast Hackable? and ‘Like’ us on Facebook.

Source : : Blog

McAfee Endpoint Security – Why You Don’t Have to Take Our Word for It.


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

It’s an unfortunate fact that evaluating security vendors today can often mean sifting through a sea of marketing hype to understand which products should be added to your short-list. Exclusive claims about what makes one product different from another may be vague, hard to find or even harder to believe.

That’s why when it comes to our endpoint security platform, McAfee believes the proof is in the product, and that your experience with it will clearly demonstrate the real-world benefits you’re looking for. However, we understand that being invited to your security discussion table depends on a few things like accuracy, trust and reputation. So, rather than make claims of my own, I’m writing this to share what others have had to say so that you don’t have to take our word for it.

First up,  McAfee Endpoint Security (ENS) recently earned a Top Product Award from AV-TEST Institute and scored high detection rates against the threats thrown against it. But that’s not an isolated incident. In fact, here are three more findings by non-McAfee firms on the abilities of ENS to protect, provide value and reliability.


NSS Labs

The NSS Labs Advanced Endpoint Protection (AEP) Test is one of the most exhaustive tests of advanced endpoint defenses in the industry. NSS gave McAfee ENS a Recommended product rating. According to NSS, this “…indicates that a product has performed well and deserves strong consideration. Only the top technical products earn a Recommended rating from NSS.” Coming from a test specifically designed to evaluate how effective a solution is at detecting advanced malware, that should tell you McAfee’s endpoint and machine learning defenses are ready for the best disguised malware you may face.

SC Magazine

Return on investment matters, and you undoubtedly strive to get the best bang for your buck. SC Magazine conducted a product group test of endpoint security systems, awarding McAfee ENS a 5 out of 5-star rating, as well as “Best Buy” in the side by side vendor comparison of products. Further, SC Magazine summarized their findings as, “Solid performance, straightforward operation and tight integration” with “no weakness found” during assessment.

Frost & Sullivan

Frost and Sullivan awarded McAfee with the 2017 Global Endpoint Security Growth Excellence Leadership Award, finding that “McAfee has seen high growth in 2016, at 17.7%, outpacing the overall market. All other top competitors either slipped or were essentially flat.” With ~40 total vendors in view, that not only means that McAfee is growing in a crowded market, but that your peers are continuing to choose to invest in McAfee ENS.

At McAfee, we are committed to being your security partner for the long haul. But we don’t want you to just take our word for it. Instead, listen to what others are saying and decide if you can afford to not see how McAfee ENS can help you stop more threats, see more in your environment, manage less and get the return your investment deserves. If you’re a current McAfee customer using McAfee VirusScan Enterprise, McAfee Site Advisor or Host Intrusion Prevention, you already own McAfee ENS. Learn about how to migrate, or download it here.

Source : : Blog

Could You Have a Toxic Relationship with Your Smartphone?


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

It’s the elephant in the room no one wants to talk about: our devotion to and dependence on our smartphones. For most of us, our children included, smartphones have become an appendage; a limb of voracious digital consumption and social obligation that keeps us scrolling, smartphone,refreshing, swiping, and responding with no end in sight.

Any friend or psychologist would encourage us to rid ourselves of toxic relationships that hinder — even threaten — our emotional and physical well-being, but what if that relationship is with a smartphone? Would you be willing to give it up (or reset the relationship) if you knew it was toxic?

Researchers are increasingly debating the impact of the smartphone on our emotional well-being, and the debate often returns to striking a balance between the ethical design of technology versus corporate profitability. One of the most compelling arguments is that of researcher Tristan Harris, a former Google Design Ethicist, on a crusade to inspire people to stop clicking and start caring about how technology is intentionally designed to shape the behavior of the people who use it. Harris has launched a nonprofit called Time Well Spent. His viral TED Talk proposes a renaissance in online design that can free tech users from being manipulated by apps, websites, and advertisers as the race for user attention increases.

From Facebook notifications to Snapstreaks to YouTube auto plays, Harris argues that our online behavior is anything but random. Instead, our toxic_relation_with_you_smartphonethoughts and feelings are being carefully manipulated by technologists behind the scenes persuasively competing for more and more our attention.

Not convinced you among the tech lemming crowd? I wasn’t either. But the discussion got me thinking and inspired me to make some specific changes to test my smartphone dependence.

5 Ways to Drastically Reduce Smartphone Dependence

  • Turn your phone to grayscale mode (google how to do this – it’s amazing)
  • Turn off all push notifications (reclaim your attention span).
  • Park your phone in one physical location (stop carrying it everywhere).
  • Stand up when you use your phone (no more getting cozy for hours).
  • Ban your phone from the bedroom (get an alarm clock).

I made these changes for a week and here’s what happened.

Not as interesting, right?
Grayscale mode, iPhone.

Absolutely no fun in sight for the first three days. Initially, I felt overcome with a sense of vulnerability, panic even that suddenly, somehow, I wasn’t in control of something. I felt an overwhelming need to check my phone every 15-30 minutes. That time gradually increased to about an hour by the third day. Not having my phone nearby, I was sure I’d miss out on something important. For the first few days, I constantly felt as if I had lost something and I’d get up and wander around before realizing my phone was docked safely in the kitchen — just like when I was growing up and had to physically walk to the kitchen to use the phone. I resolved to check my phone once every three hours rather than carry it with me from room to room. When I did check it, surprisingly, the world had not collapsed without my attention to it. I found an average of three texts (two from family with non-critical comments, and usually, one discount text from a retailer).

Because I turned my screen grayscale (wow, what a game changer!) I didn’t feel the anticipation of checking social media, scrolling, reciprocating, uploading, or commenting. My phone in the grayscale mode made using it stale, almost irritating. I realized looking at my phone in grayscale that I being overly influenced and pulled by pretty pictures and all the colors, sounds, links, and prompts, which had come to own my attention. Sadly, I was giving my time to this relationship without any meaningful, lasting benefit coming back to me. I was in a toxic relationship, and something had to change.

By the end of the week, I felt awesome, empowered almost. I had successfully distanced myself from a toxic relationship and redefined it on my terms. I also realized something profound: There’s an unspoken cost to unbalanced technology use I’m not willing to hand over any longer, and that is my time.

When I parked my phone in the kitchen, banned it from the bedroom, and refused to sit down with it, I noticed patches of extra time magically appear in my day. What could I do with all the time I once poured into my phone? As it turns out, quite a lot.

I’m keeping my new habits, and I’m encouraging my family to do the same for a good reason. Here’s what we know: Kids are spending more time on digital devices than ever before, and that trend has no reason to reverse. Anxiety disorders linked to social media use is at an all-time high. Also, researchers are confirming the link between technology, depression, and suicide among youth.

I’m not willing to just go with the flow on this one. There’s just too much is at stake.

Take the challenge: Are you willing to take specific steps (like the ones listed above) to rethink and redefine your relationship with your smartphone?

Source : : Blog