Queen Victoria would not be amused by such unseemly behaviour! :-)
McAfee is promising to patch a vulnerability in its hosted anti-malware service after it found a flaw that allowed systems where the product was installed to be turned into potential spam-relay nodes. SaaS for Total Protection, the vulnerable software, will be patched on "January 18 or 19, as soon as we have finished testing …
Last night I got email bounced back to me by MSN and Hotmail saying my IP address was spamming.
A Brand new windoze 7 PC, only 26 days in use with a free 60 day trial version of McAfee.
I think the trial period just ended, AVG, zonealarm et al, here I come (again).
Much like build their own lightsaber does a Jedi, build their own rig does the BOFH
Youngling PFYs the Ways of the Net must learn.
UNLEARN the ways of the Dark Side you must: UNLEARN your hard-drive of pre-installed software you must.
If from a store your PC have you purchased, know that filled with the Dark Side it is; full of corruption and fear it is.
Windows leads to malware; malware leads to McAfee; McAfee leads to anguish; anguish leads to pain; pain leads to fear; fear leads to the Dark Side; the Dark Side leads to Windows: A circle of anguish, fear, pain and spam Windows is, young PFY.
Only when cleansed you hard-drive is can your journey to BOFH begin. Alert to pre-installed software the BOFH always is. Mindful of pre-installed Windows the wise BOFH is. Clean USB Boot Drive a BOFH always carries. A BOFHs mind and discipline his weapons are; not these crude apps of anti-malware. From Saint Travaglia and The Reg does a BOFHs knowledge and wisdom flow. Trust not the lies spread by Darth Balmer; trust not the promises of low resource use from Darth Norton.
This post has been deleted by its author
Skyhigh Security, formed from the Secure Service Edge (SSE) pieces of McAfee Enterprise and FireEye, today announced its name and data-guarding portfolio.
CEO Gee Rittenhouse, who led McAfee Enterprise Cloud and is a former Cisco security executive, said Skyhigh aims to shift practitioners' focus from granting or blocking network access to resources, to fine-grain monitoring and protection of applications and data even after people have logged in.
Instead of simply securing access to an application, Skyhigh examines what people and machines do with the software, and how they use information with in once their identity has been verified and access granted, Rittenhouse said.
BlackBerry security researchers have identified a ransomware family targeting English-speaking victims that is capable of erasing all non-system files from infected Windows PCs.
LokiLocker, a ransomware-as-a-service (RaaS) family with possible origins in Iran, was first seen in the wild in mid-August 2021, BlackBerry Threat Intelligence researchers write in a blog post today.
"It shouldn't be confused with an older ransomware family called Locky, which was notorious in 2016, or LokiBot, which is an infostealer," they say. "It shares some similarities with the LockBit ransomware (registry values, ransom note filename), but it doesn't seem to be its direct descendant."
Infamous ransomware group Conti is now the target of cyberattacks in the wake of its announcement late last week that it fully supports Russia's ongoing invasion of neighboring Ukraine, with the latest hit being the leaking of its source code for the public to see.
This disclosure comes just days after an archive leaked containing more than a year's worth of instant messages between members of Conti, believed to be based in Russia: we're talking 400 files and tens of thousands of lines of internal chat logs written in Russian. The internal communication files include messages that run from January 2021 to February 27 of this year.
Conti announced on February 25 that it was giving its "full support" to Russia's attack on Ukraine, adding the threat that, "If anybody will decide to organize a cyberattack or any war activities against Russia, we are going to use our all possible resources to strike back at the critical infrastructures of an enemy."
LogoWatch Newly combined security outfits McAfee Enterprise and FireEye have revealed a new name: "Trellix".
Readers may find the name familiar, as another tech company used the same name in the 1990s and early 2000s when it offered intranet and web published tools such as Trellix Web.
In 2001, this press release announced that Trellix had licensed tech from a company called Pyra Labs, which operated a service called "Blogger". Yes, that Blogger – the platform Google acquired in 2003 and which was quickly found to have serious security problems. A year after the Pyra Labs news, we reported that Trellix was acquired by Interland, which rated it as possessing "the best technology in terms of novice users creating professional quality websites".
The UK's Competition and Markets Authority has invited comments from industry and interested parties about NortonLifeLock's proposed $8bn purchase of fellow infosec outfit Avast.
The merger inquiry will run until the 16 March when the comments will be collated and assessed to determine if there is sufficient concern to warrant a deeper investigation.
"The CMA is considering whether it is or may be the case that this transaction, if carried into effect, will result in the creation of a relevant merger situation under the merger provisions of the Enterprise Act 2002," it said.
Those hoping for some respite from the world's ongoing woes are out of luck, apparently.
FireEye and McAfee, whose business models center around charging enterprises money to protect their networks from cyber-threats, issued a joint report this week predicting next year you'll see an increase in cyber-threats, particularly those against enterprise networks and the staff who run them.
"The time to repurpose vulnerabilities into working exploits will be measured in hours and there’s nothing you can do about it ... except patch," wrote FireEye's Fred House in a note accompanying the 2022 Enterprise Threat Predictions report.
British-American software tycoon John McAfee was found dead in his cell in a Barcelona prison on Wednesday.
Spain’s high court – the Audiencia Nacional – had just hours earlier agreed to his extradition to America to stand trial. He was accused of tax evasion, and of breaking securities law while pocketing $23m from cryptocurrency promotions and associated deals.
The 75-year-old antivirus baron – who founded McAfee Associates in the 1980s and made a fortune before more or less retiring in the mid-1990s – was being held in Sant Esteve Sesrovires. He was arrested at Barcelona airport in October 2020, and had been behind bars ever since.
The UK's Competition and Markets Authority (CMA) has reached agreement with antivirus vendor McAfee that means some customers whose software subscription was automatically renewed will be able to get a refund.
The deal follows a lengthy investigation into the antivirus sector that kicked off in 2018 amid concerns that "some firms in the industry may not be complying with consumer law."
It's quite the slap on the wrist for McAfee, whose software tends to be bundled with a large number of devices sold in the UK. Customers who signed up with the company may not have understood the ins and outs of auto-renewal, hence the CMA action.
McAfee will sell off its enterprise business to private equity firm Symphony Technology Group (STG) for $4bn in cash, the venerable security biz announced on Monday.
The deal comes just months after McAfee went public and the news saw its share price jump three per cent. After selling off its enterprise arm McAfee will focus on its consumer security business, using its wide brand recognition to grab more of the growing cybersecurity market. Meanwhile, STG adds another enterprise security scalp to its growing collection.
It is with some irony then that the man whose name is that brand – founder John McAfee – is again in trouble for alleged illegal behavior. On Friday, McAfee was indicted by the US authorities on fraud and money laundering conspiracy charges. It follows a separate indictment for tax evasion in October, for which McAfee was arrested in Spain.
Security vendor McAfee has detected an attack it believes was likely aimed at telecoms companies in the hope of stealing information related to 5G networks.
McAfee has named the attack “Operation Diànxùn” and says it resembles past attacks perpetrated by groups named RedDelta and Mustang Panda. Both groups have been associated with China by other security researchers.
The attack begins, McAfee’s researchers assert, with visits to a faked Huawei careers page. Phishing may be a factor in driving traffic to that site, which serves up fake jobs and real malware.
Biting the hand that feeds IT © 1998–2022