The PRWIRE Press Releases https:// 2015-02-12T06:57:14Z Are Aussie couples heading for a Valentine's Day fail? 2015-02-12T06:57:14Z are-aussie-couples-heading-for-a-valentine-s-day-fail As Valentine’s Day approaches, will Cupid’s bow strike loved-up Aussie couples this year or could it miss them completely as new research suggests that we are severely lacking in the love department with over half of men confessing to never buying their loved one a gift. The research, conducted by the Independent Grocers of Australia, IGA, has revealed  that Aussie men are heading for the Valentine’s Day bad books this year, especially when it comes to parting with their dollars to buy gifts, with 1 in 4 spending under $302. It therefore comes as no surprise that when asked how much they would like to spend on a gift if their partner didn’t find out, 1 in 3 men admitted it would be as little as five dollars – further evidence that romance could be heading for trouble this Valentine’s Day. And it’s not just the cost of gifts that is proving problematic for men, they are also lacking inspiration in the ideas department with some unusual gifts topping the poll of previous Valentine’s Day presents including kitchen gadgets (18 per cent), heart- shaped gifts (16 per cent) and personal grooming items (15 per cent). Out of the 47 per cent of men that do buy gifts, 83 per cent of those presents are bought in an unplanned, last minute dash to the shops. With a mad panic on the day, it’s no surprise that 1 in 3 say that they find buying a Valentine’s Day gift stressful and could explain those unconventional present choices that crop up from year to year. Even the men who do buy gifts regularly aren’t complete angels with a further 45 per cent ending up in trouble with their partner after committing the ultimate faux pas of forgetting to buy a gift all together at some point in their relationship. So, in an effort to make a Valentine’s Day easy for couples everywhere, IGA is giving men a much needed helping hand with gift inspiration, offering a range of great value gifts including bouquets of roses and chocolates that will make their loved ones happy without stretching the wallet, all with the convenience of a local store.  Speaking about the results, Madeleine Fitzpatrick, General Manager Marketing, Metcash Food and Grocery, said: “While Valentine’s Day shouldn’t be about spending hundreds of dollars on a gift, it’s the perfect opportunity to make your partner feel special and treat them to something nice. We know that not all customers have time to plan their gifts ahead so at IGA we’re on hand to make life easier with last minute purchases that won’t break the bank. “With an IGA just around the corner, there is no excuse for coming home without a beautiful Valentine’s Day gift to make your loved one smile – no matter how last minute it is!” concludes Fitzpatrick. - Ends -For media enquiries and further information, please contact: Kat Morris, 02 8303 6464, kat@zing.net.au Laura Quickfall, 02 8303 6464, lauraq@zing.net.au  CheckVault.com.au launches to put a stop to $7 billion Aussie business cash-flow crisis 2014-11-12T01:08:27Z the-unspoken-7-billion-leaving-aussie-businesses-high-and-dry New independent escrow service CheckVault.com.au has officially launched today to help put a stop to the staggering 7 billion dollars that Australian businesses have lost in the last year largely due to poor cash-flow management. This analysis of the latest industry insolvency statistics[1] shows that almost 9,500 Australian businesses have become insolvent in the past year alone, with nearly a quarter of these (2,153 or 23 per cent) seen in the construction industry – the largest sector to be affected, contributing an average loss of 1.6 billion dollars. Aiming to put a stop to cash-flow problems and help alleviate the situation, Sydney based start-up CheckVault is a free and secure payment service that offers peace of mind by taking financial risk out of the equation whether you are buying or selling.  The service has launched across Australia following a two-year beta test stage that has seen a 100% success rate across customers and businesses. By acting as an independent third party, CheckVault securely holds the funds for a job via an escrow arrangement with ANZ Bank and Perpetual Corporate Trust until the work is complete.  Customers can then simply release funds directly to the supplier in just a few clicks once both parties are satisfied. Co-Founder Kieran Martin comments, “As the figures highlight, there is a clear issue with facilitating payments across SMEs and CheckVault is the solution that benefits everyone.  Now not only can the supplier get on with a job safe in the knowledge that funds have already been held for them, but customers can even take advantage of the knock-on competitive pricing that this security provides.  It’s a win-win for both parties.” Martin, a former Chartered Accountant, launched the service after seeing first hand the effects that late payments had on many of his client’s businesses.  Spurred on by experience from close friend Nick Ogilvie, now a Business Development Manger for the company, Kieran started CheckVault to provide a safe, simple and secure way for customers and businesses to reduce the risks associated with transactions. The Block winner and CheckVault spokesperson Dale Vine, who most recently returned to the show as part of the 2014 Block Fans vs Faves series also commented on the launch of the service, “I’ve been lucky enough not to get burnt in the past but I know plenty of friends in the industry that have, and the effects can be devastating. “You’ve got to remember that it’s not just a tradie that you’re affecting with late payments, but also their entire family.  We’ve all got mouths to feed so it’s great that a service like CheckVault can take the hassle out of quoting and job security – and best of all, do so free of charge for both parties.  I’ve started to use it as it’s a no brainer,” added Dale. Dale Vine and further case study businesses are available for comment ENDS About CheckVault Founded in 2012, CheckVault is Australia’s first free secure escrow service providing peace of mind to both consumers and businesses. Once a quote for a job is submitted, payments are secured and the funds are held safely in the CheckVault until the work is complete, to be released only when both parties are satisfied.  When payment risk is taken out of a job, both parties win. CheckVault holds the funds via an escrow arrangement with ANZ Bank and Perpetual Corporate Trust and is available to consumers and businesses across Australia.  This advice is general in nature and does not take individual circumstances into account.  For more information visit checkvault.com.au and consider the terms and conditions [1]According to ASIC Insolvency statistics July 2013 – June 2014 (Table 3.1.5.1) ‘LOVE IS NOW’ CONFIRMED FOR NATIONWIDE RELEASE DATE THROUGH HOYTS CINEMAS ON 4TH DECEMBER 2014 2014-10-21T00:06:58Z love-is-now-confirmed-for-nationwide-release-date-through-hoyts-cinemas-on-4th-december-2014-1 SYDNEY, 21 October 2014 – Eponine Films has announced that Love is Now, starring Australian actors Eamon Farren (Chained, Red Dog, Carlotta), Claire Van Der Boom (The Square, Red Hill, ‘Hawaii Five-0’) and Anna Torv (‘The Secret Life of Us’, ‘Fringe’) will be released in Australian cinemas nationwide on 4th December 2014. Showing support for Australian filmmaking talent, HOYTS Group is partnering with Eponine’s distribution arm Eponine Entertainment to release the film nationwide, negotiated through the film’s producer Behren Schulz. Love is Now is the intriguing yet mysterious drama chronicling a summer of love for experienced photographer Audrey (Van Der Boom) and aspiring snapper Dean (Farren).  Propelled by new love and Audrey’s free spirit, the couple embarks on a formative country adventure following the NSW Harvest Trail where they discover significantly more than they ever expected along the way. The film’s trailer can be viewed here: www.loveisnowfilm.com  www.youtube.com/loveisnowfilm  Love is Now is written and directed by first time feature director Jim Lounsbury with producing partner Behren Schulz and the experienced hand of David Lightfoot (Wolf Creek, Rogue) as Line Producer. The film features a host of Australian talent in supporting roles including Dustin Clare (‘Spartacus’, ‘McLeod’s Daughters’), Heather Mitchell (Muriel’s Wedding, The Great Gatsby), Chris Haywood (Shine, Jindabyne), Rhys Muldoon (‘House Husbands’, ‘Rake’) and 2013 Tropfest winner Matt Hardie, as well as Polish actor Lech Mackiewicz (The Pianist, ‘Marking Time’).  Love is Now is also set to a soundtrack composed by Kram (Spiderbait). Schulz says, “We’re really proud to be bringing Love is Now to Australian cinema audiences through HOYTS.  Australian independent cinema can be challenging locally, however HOYTS continues to prove that they’re a leader when it comes to promoting home-grown talent, which is really refreshing.  This film is a uniquely intriguing and mysterious drama, so we’re excited to see such a wide release this Christmas.  We hope that audiences put their trust in something a bit different this year and support local.” Damian Keogh, HOYTS Group CEO comments, “We want to encourage more Australians to support Australian cinema, and they can do this by watching Australian films.  We know that Australian films do well internationally but often that’s not the case at home.  In support of Australian cinema, HOYTS has collaborated innovatively with Eponine Entertainment to create a model for Love is Now so that audiences will get the opportunity to see a beautiful home-grown movie during December.” -ENDS- For media enquiries and further information please contact: Kristoff Clark, 02 8303 6467, kristoff@zing.net.au Jesse Lewis, 02 8303 6420, jesse@zing.net.au McAFEE NAMES MAUBOY, GOODREM AND URBAN THE ‘MOST DANGEROUS CELEBRITIES’ IN AUSTRALIA 2014-10-01T06:39:27Z mcafee-names-mauboy-goodrem-and-urban-the-most-dangerous-celebrities-in-australia SYDNEY, Australia, October 1, 2014 – Topping the charts for all the wrong reasons, Aussie singers Jessica Mauboy, Delta Goodrem and Keith Urban have been named by the eighth annual McAfee Most Dangerous CelebritiesTM list as the riskiest Australian names to search for online. Underscored by the recent celebrity photo hacking controversy which has highlighted the importance of cyber security on a global scale, the analysis revealed that sites offering celebrity ‘videos’ and ‘pictures’ pose the biggest threat to online safety. With inevitable increased interest around certain names, cybercriminals will often capitalise on this by loading related websites with harmful spyware, adware, spam, phishing and viruses amongst other malware. Analysis of the Australian results revealed that Jessica Mauboy led the list with a 12.2% risk of returning a malicious website (up from third position in 2013). In recent months her profile has been boosted by a bid for international stardom which saw the singer represent the country at both the Eurovision Song Contest and at the handover ceremony for the Commonwealth Games in Scotland amongst other activity. Delta Goodrem’s recent twitter embarrassment with US actor Marlon Wayans, which saw her labeled an ‘unrhythmic white woman’ has clearly worked in her favour, boosting her international profile and putting her in second position with an 11% risk (fourth in 2013). Her witty response to the tweet was also well received, scoring 779 retweets and 1,272 favourites. Keith Urban, the country singer and husband of Nicole Kidman, was named third in the list with a danger risk of 10.9% (a 2014 new entry). Urban is no stranger to gossip websites over the past year, with the couple’s relationship under constant and intense scrutiny. The ‘American Idol’ panelist also recently completed an Australian tour for his recent album Light The Fuse. The musical trio combined to knock Kylie Minogue (10.7%) off the top spot from the 2013 list, placing her fourth in the list followed by Hollywood A-Lister Russell Crowe (10.6%) - another new entry. Australian acting talent continued the remainder of the top 10, with Expendables 3 star Mel Gibson (9.2%), The Rover’s Guy Pearce (9.1%), popular TV actor Jesse Spencer (‘Chicago Fire’, ‘House’) (8.8%), Deliver Us From Evil star Eric Bana (8.3%) and Pitch Perfect actress Rebel Wilson (who recently shot the film’s sequel) (8.2%) completing the list. The top 10 Australian celebrities from this year’s study with the highest percentages of risk are:  1. Jessica Mauboy: 12.2% 2. Delta Goodrem: 11% 3. Keith Urban: 10.9% 4. Kylie Minogue: 10.7% 5. Russell Crowe: 10.6% 6. Mel Gibson: 9.2% 7. Guy Pearce: 9.1% 8. Jesse Spencer: 8.8% 9. Eric Bana: 8.3% 10. Rebel Wilson: 8.2% The 2014 Australian list showed a gender reversal of the 2013 results, with male stars leading over females at a ratio of six to four. In another reversal, the listings also showed a skew towards acting talent over singers (six against four) whereas the 2013 list was made up of singers, models and actors. “The recent high-profile hacking shows just how influential celebrities are across the world, and rightly or wrongly, the incident caused a massive spike in searches, even ‘breaking the internet’ in New Zealand,” says Sean Duca, Chief Technology Officer for McAfee Asia Pacific, part of Intel Security. “We know that cybercriminals will continue to gain from this by luring curious users with bogus websites, downloads and files, so we all need to be sure of the sites we can continue to trust and do everything we can to protect both our technology and our own personal information from being compromised,” continued Duca. Global Analysis On a global scale, Jimmy Kimmel is the second male to find his way to the No. 1 spot (moving up from No. 39) following Brad Pitt in 2008. DJ Armin van Buuren takes the number two spot behind Kimmel and Ciara, the third. Additional celebrities in the top 10 include Blake Shelton, Britney Spears (holding her place at No.7), and three New Jersey natives: Bruce Springsteen, Jon Bon Jovi and Chelsea Handler. Singer Christina Aguilera completed the global top 10 list. The top 10 global celebrities from this year’s study with the highest percentages of risk are: 1. Jimmy Kimmel: 19.38% 2. Armin van Buuren: 19.33% 3. Ciara: 19.31% 4. Flo Rida: 18.89% 5. Bruce Springsteen: 18.82% 6. Blake Shelton: 18.47% 7. Britney Spears: 18.19% 8. Jon Bon Jovi: 17.64% 9. Chelsea Handler: 17.22% 10. Christina Aguilera: 16.67%  How You Can Stay Protected: Beware of clicking on third party links. You should access content directly from official websites of content providers. For example, visit ABC.com to find Jimmy Kimmel’s latest episodes. Ensure you use web protection that will notify you of risky sites or links before you visit them. Stick to official news sites for breaking news. Don’t download videos from suspect sites.This should be common sense, but it bears repeating: don’t download anything from a website you don’t trust — especially video. Most news clips you’d want to see can easily be found on official video sites and don’t require you to download anything. “Free downloads” are by far the highest virus-prone search term. Anyone searching for videos or files to download should be careful as not to unleash unsafe content such as malware onto their computers. Always use password protection on your phone and other mobile devices.If you don’t and your phone is lost or stolen, anyone who picks up the device could have access to your personal information online. Don’t “log in” or provide other information:If you receive a message, text or email or visit a third-party website that asks for your information—credit card, email, home address, Facebook login, or other information—to grant access to an exclusive story, don’t give it out. Such requests are a common tactic for phishing that could lead to identity theft. Search online using a tool, such as SiteAdvisor software, which protects users from malicious websites and browser exploits.  A complimentary version of SiteAdvisor software can be downloaded at www.siteadvisor.com Find More Information:  ·       To learn more about the research, you can check out o   Global list web page: www.mcafee.com/most-dangerous-celebrities o   Blog post from Gary Davis: http://blogs.mcafee.com/consumer/most-dangerous-celebs-2014 o   Blog post from Robert Siciliano: http://blogs.mcafee.com/consumer/risky-celeb o   Twitter: Follow @McAfeeConsumer for live online safety updates and tips. Use hashtag #RiskyCeleb to discuss the Most Dangerous Celebrities of 2014 ·       Web surfers can also visit the McAfee Facebook page at www.facebook.com/mcafee and McAfee Security Advice Center for information on the latest consumer threats, and tips for living safe online ·       If you do decide to search for information on a major event or celebrity in the news, make sure your entire household’s devices have protection, such as McAfee LiveSafe™ service, which protects all devices from your PCs, Macs, and tablets to your smartphone. It also includes malware detection software, McAfee® Mobile Security, to protect your smartphone or tablet from all types of malware Survey Methodology The study was conducted using McAfee® SiteAdvisor® site ratings to determine which sites are risky to search when attached to celebrity names on the Web and calculates an overall risk percentage. McAfee SiteAdvisor technology protects users from malicious websites and browser exploits. SiteAdvisor technology tests and rates nearly every Internet website it finds, and uses red, yellow and green icons to indicate the website’s risk level. Ratings are created by using patented advanced technology to conduct automated website tests and works with Internet Explorer, Chrome, Safari and Firefox. The terms “Jimmy Kimmel,” “Jimmy Kimmel downloads,” “Jimmy Kimmel mp4,” and “Jimmy Kimmel torrentz” were used to search for Jimmy Kimmel, and replicated for each celebrity on the list. The results indicated the percentage of risk of running into online threats designed to steal personal information. Fans clicking on these risky sites and downloading files including photos and videos become more vulnerable to downloading viruses and malware. About McAfee McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security combines the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. Intel Security’s mission is to give everyone the confidence to live and work safely and securely in the digital world. www.intelsecurity.com. ### Note: McAfee is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Intel is a trademark or registered trademark of Intel Corporation in the US and/or other countries.  Other names and brands may be claimed as the property of others.   MCAFEE LABS REPORT HIGHLIGHTS SUCCESS OF PHISHING ATTACKS WITH 80 PERCENT OF BUSINESS USERS UNABLE TO DETECT SCAMS 2014-09-04T08:00:56Z mcafee-labs-report-highlights-success-of-phishing-attacks-with-80-percent-of-business-users-unable-to-detect-scams Sydney, Australia – Thursday 4th September, 2014 – McAfee Labs today released the McAfee Labs Threats Report: August 2014, revealing that phishing continues to be an effective tactic for infiltrating enterprise networks. Testing business users’ ability to detect online scams, the McAfee Phishing Quiz uncovered that 80% of its participants failed to detect at least one of seven phishing emails. Furthermore, results showed that finance and HR departments, those holding some of the most sensitive corporate data, performed the worst at detecting scams, falling behind by a margin of 4% to 9%. In Australia, the most skilled performers in the quiz were executives and IT professionals. Three quarters of Australian business users fell for at least one of the seven phishing emails. Since last quarter’s Threats Report, McAfee Labs has collected more than 250,000 new phishing URLs, leading to a total of nearly one million new sites in the past year. Not only was there an increase in total volume, there was a significant rise in the sophistication of phishing attacks occurring in the wild. Results showed both mass campaign phishing and spear phishing are still rampant in the attack strategies used by cybercriminals around the world. The study revealed Australia as having 1,709 URL domains containing phishing links, the highest in Asia Pacific, ranked ninth globally. “One of the great challenges we face today is upgrading the Internet’s core technologies to better suit the volume and sensitivity of traffic it now bears,” said Vincent Weafer, senior vice president for McAfee Labs. “Every aspect of the trust chain has been broken in the last few years—from passwords to OpenSSL public key encryption and most recently USB security. The infrastructure that we so heavily rely on depends on technology that hasn’t kept pace with change and no longer meets today’s demands.” Findings also revealed new cybercrime opportunities since the public disclosure of the Heartbleed vulnerability, as stolen data from still vulnerable websites is currently being sold on the black market. Lists of unpatched websites have quickly become hit lists for cybercriminals and tools are readily available to mine unpatched sites. With these tools, it is possible to tie together an automated system that targets known vulnerable machines and extracts sensitive information. Each quarter, the McAfee Labs team of more than 400 multidisciplinary researchers in 30 countries follows the complete range of threats in real time, identifying application vulnerabilities, analysing and correlating risks, and enabling instant remediation to protect enterprises and the public. Additional Key Findings Operation Tovar: McAfee joined global law enforcement agencies and others to take down Gameover Zeus and CryptoLocker by blocking more than 125,000 CryptoLocker domains and sinkholing in excess of 120,000 Gameover Zeus domains. However, copycats are on the rise, creating new variants of ransomware or financial-targeting malware using the leaked Zeus source code. Growth in Malware: New malware samples rose by only 1% in the second quarter. However, with more than 31 million new samples, this was still the largest amount recorded in a single quarter. The total count of mobile malware increased by 17% in the second quarter, while the rate of new malware appears to have leveled off at about 700,000 per quarter. Network Threats: Denial of service attacks rose by 4% in the second quarter and remain the most prevalent type of network threat. To read the full McAfee Labs Threats Report: August 2014 with a complete list of findings, please visit: http://mcaf.ee/uycbt About McAfee Labs McAfee Labs is one of the world’s leading sources for threat research, threat intelligence, and cybersecurity thought leadership. The McAfee Labs team of more than 400 researchers collects threat data from millions of sensors across key threat vectors—file, web, message, and network. The team then performs cross-vector threat correlation analysis and delivers real-time threat intelligence to tightly integrated McAfee endpoint, content, and network security products through its cloud-based McAfee Global Threat Intelligence service. McAfee Labs also develops core threat detection technologies—such as McAfee DeepSAFE technology, application profiling, and graylist management—that are incorporated into the broadest security product portfolio in the industry. http://www.mcafee.com/us/mcafee-labs.aspx About McAfee McAfee, part of Intel Security and a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com - ENDS - About McAfee McAfee, part of Intel Security and a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com Note: McAfee is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others. Cyberbullying among connected teens and tweens rises 56 per cent in 12 months 2014-07-28T04:17:33Z cyberbullying-among-connected-teens-and-tweens-rises-56-per-cent-in-12-months Sydney, Australia: 28 July 2014 – McAfee, part of Intel Security, has released findings from its Teens, Tweens and Technology research today, which found that 81 per cent of Australia’s youth have witnessed cyberbullying – a huge increase of 56 per cent from 2013. The annual research, which was first undertaken last year, examines the online behaviour and social networking habits of Australian tweens and teens and aims to educate on the impact that risky behaviour has on their privacy, reputation and social media experiences. According to the research, YouTube is the number one social site across all age groups, with Facebook the most likely to be visited daily. In 2013, Skype was the most popular social website among tweens. New social media sites, such as Keek, a video-based social networking site, and Yik Yak, an anonymous messaging app, have gained quick acceptance across all age groups. Facebook has seen a spike in underage users, with 31 per cent of 8-9 year olds and 60 per cent of 10-12 year olds admitting to having a Facebook profile, despite the legal age being 13 years old. This is a big rise from 2013, where 26 per cent of tweens were using Facebook. Melanie Duca, APAC Consumer Marketing Director, McAfee, part of Intel Security says,“Teens and tweens are very comfortable operating in the online world, yet the risks have never been greater. Young people are often the pioneers for new technologies so they need to understand the consequences of their online behaviour.” The survey also revealed that 40 per cent of teens and tweens are experiencing cyberbullying. “For the second year running, we have uncovered findings about how vulnerable our young people are online. While the figures on cyberbullying are confronting, we know that continued efforts to educate on cyber safety, cyber security and responsible online behaviour among this audience is critical,” says Melanie. According to long-time partner of McAfee, Life Education Australia, it’s concerning that the research found that a quarter of teens and tweens don’t know where to report incidences of cyberbullying. Life Education National Program Development Manager Robyn Richardson, says, “Our bCyberwise and It’s Your Call programs, which were developed in conjunction with McAfee, teach teens and tweens about how to be safe cyber citizens and how to respect others online. “We understand that with the rise in the number of young people online, and at younger ages, cyberbullying is an unfortunate factor in online interaction. There is still a lot to be done in educating about the negative consequences for victims, witnesses and those who display bullying behaviour,” Robyn continued. “The focus of the program is prevention; teaching valuable skills that promote social and emotional development, positive relationships, self-respect and safe decision-making to help combat and minimise the risks young people are facing online,” said Robyn. The Australian government has made a significant investment to create resources to curb cyberbullying and make reporting of cyberbullying incidences more streamlined. A key initiative is the appointment of an e-Safety Commissioner, which McAfee, part of Intel Security, fully supports. Risk vs. reward on social media What the research also found is that the drive for attention and acceptance, as well as the growing comfort level of young people with digital media, is leading to young people letting their guard down and engaging in behaviours that place them at risk. Half of teens and tweens say they have done or posted something risky online and one in five have tried to reinvent themselves online by creating a fake profile (12 per cent). Nearly half (48 per cent) have chatted online with or live tweeted someone they don’t know, a jump from 19 per cent in 2013. And one in five (18 per cent) have met someone in person that they first met online. Parenting expert, Dr Justin Coulson, says, “We know that teens and tweens are willing to sacrifice privacy and cyber safety for the gratification they feel when their social network responds positively – they weigh up risk and reward on a daily basis – and far too many are choosing to take the risk and get the reward, even if it endangers them. “Our children may even have multiple identities on the one platform – one that is ‘parent friendly’, and another that parents don’t know about that might feature more concerning content. “We need to understand that kids are still posting private information online or sharing too much in order to get ‘likes’, and continue to educate them about the risks,” concluded Dr Coulson. Parental guidance respected, but parents are in the dark Over eight in 10 teens and tweens say they respect guidance on personal decisions regarding social media from their parents, and nine in 10 say their parents trust them to make the right decisions online. Most say their parents have taken steps to monitor or control their online behaviour, up 11 per cent from 2013 when 80 per cent of parents were placing controls on online activity. However, parents are not fully across their children’s online activity with 70 per cent saying their parents know only some of what they do online. Half say their parents can’t keep up with the technology and 70 per cent admit to proactively hiding what they do online from their parents. “It’s heartening to know that many kids respect the advice from a parent, and that parents are trying to be more active about monitoring and restricting inappropriate content,” says Alex Merton-McCann, McAfee Cybermum, and mother of four. “But the fact that they admit their parents do not know everything they do online and proactively hide their online activity is cause for concern. “Parents should establish an ongoing non-confrontational dialogue with their children about this topic and continue to monitor their activities. Parents also need to stay up-to-date with advancements in technology and social networking so that they increasingly speak to their children with an insider’s point-of-view. “Our aim is to keep the risks top-of-mind, educate young people about safety precautions and align with parents in their ongoing efforts to keep their children safe,” says Alex. McAfee will continue to work with partners such as Life Education Australia to educate young people and their parents on the issue of internet safety. In fact, Life Education, in conjunction with McAfee, has developed the Parent Hub, an online portal that provides accessible cyber safety advice for parents. Other Survey Highlights: Online fears Younger kids mostly fear being cyberbullied online (27%), whereas teens are more fearful of losing their information (21%), being hacked (31%) and losing their privacy (23%) Parental geotracking 74% would agree to their parents receiving alerts about their location Sibling protection ·       Over a quarter (28%) of teens and tweens keep an eye on their younger siblings’ social pages, and actively providing advice on what’s appropriate Top 5 Tips for parents to help educate their kids: 1. Connect with your kids. Talk to them about the risks of being online and make sure the communication lines are always open. 2. Learn their technology. Stay one step ahead and take the time to research the various devices your kids use. You want to know more about their devices than they do. 3. Get social. Stay knowledgeable about the newest and latest social networks. Join whatever networks or sites your kids are into so you understand how it all works. 4. Reputation management. Make sure your kids are aware that anything they post online is permanent. 5. Stay calm. If your kids come to you with an online problem, it’s important not to overreact. Deal with it calmly and don’t threaten to take devices away, or they may not feel confident about seeking your help again.  ENDS Quantitative Methodology The Futures Company conducted a survey among 1,033 children and teenagers aged 8 to 17 in Australia. The survey was split evenly among age and gender. The interviews were conducted from June 16 to June 27, 2014. About McAfee McAfee, part of Intel Security and a wholly owned subsidiary of Intel Corporation (NASDAQ: INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its visionary Security Connected strategy, innovative approach to hardware-enhanced security, and unique global threat intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com About Life Education Australia Life Education, as the largest non-government provider of health education to children and young people in Australia, has been a valued partner of Australian schools for over 35 years. It has 100 plus mobile learning centres and qualified educators across the country and reaches 620,000 children nationally. A registered charity, independent of both government and religion, Life Education aims to empower children to make safe and healthy decisions. It continues to do so by expanding its national health and wellbeing program in Australia to include cyber safety content with the support of McAfee. The bCyberwise and It’s Your Call modules have reached 177,000 children since launching in 2013. McAfee Labs report sees mobile malware target trust in early 2014 2014-06-24T06:32:30Z mcafee-labs-report-sees-mobile-malware-target-trust-in-early-2014 Sydney, Australia – Tuesday, 24 June, 2014 – McAfee Labs today released the McAfee Labs Threats Report: June 2014, revealing mobile malware tactics that abuse the popularity, features, and vulnerabilities of legitimate apps and services, including malware-infested clones masquerading as the popular mobile game Flappy Birds. The report highlights the need for mobile app developers to be more vigilant about the security of their apps, and encourages users to be mindful when granting permission requests that criminals could exploit for profit.  The manipulation of legitimate mobile apps and services played a key role in the expansion of mobile malware at the beginning of 2014. McAfee Labs found that 79 per cent of sampled clones of the Flappy Birds game contained malware. Through these clones, perpetrators were able to make phone calls without user permission, install additional apps, extract contact list data, track geo-location, and establish root access for uninhibited control over anything on the device, including the recording, sending, and receiving of SMS messages. Beyond app reputation, McAfee Labs saw notable examples of mobile malware that take advantage of the features of trusted apps and services, including: ·       Android/BadInst.A: This malicious mobile app abuses app store account authentication and authorisation to automatically download, install, and launch other apps without user permission ·       Android/Waller.A:  This Trojan exploits a flaw in a legitimate digital wallet service to commandeer its money-transfer protocol and transfer money to the attacker’s servers ·       Android/Balloonpopper.A:  this Trojan exploits an encryption method weakness in the popular messaging app WhatsApp, allowing attackers to intercept and share conversations and photos without users’ permission  “We tend to trust the names we know on the internet and risk compromising our safety if it means gaining what we most desire,” said Vincent Weafer, senior vice president for McAfee Labs. “The year 2014 has already given us ample evidence that mobile malware developers are playing on these inclinations, to manipulate the familiar, legitimate features in the mobile apps and services we recognise and trust. Developers must become more vigilant with the controls they build into these apps, and users must be more mindful of what permissions they grant.” Each quarter, the McAfee Labs team of 450 multidisciplinary researchers in 30 countries follows the complete range of threats in real time, identifying application vulnerabilities, analysing and correlating risks, and enabling instant remediation to protect enterprises and the public. Additional Key Findings ·       Mobile on the move: McAfee Labs’ “zoo” of mobile malware samples grew by 167 percent between Q1 2013 and Q1 2014 ·       Suspicious URLs:New suspect URLs set a three-month record with more than 18 million, a 19 percent increase over Q4 2013 and the fourth straight quarterly increase ·       Signed malware: New malicious signed binaries remain a popular form of attack, increasing by 46 percent in the first quarter of 2014 ·       Master boot record malware: New threats attacking the master boot record increased by 49 percent in the first quarter, reaching an all-time high for a single quarter ·       Ransomware in repose: Ransomware sample counts have dropped for three straight quarters ·       Botnets and currency mining: McAfee Labs saw botnet providers include virtual currency mining capabilities with their services, reflecting the increasing popularity of digital currencies such as Bitcoin   To read the full McAfee Labs Threats Report: June 2014, please visit: http://mcaf.ee/5q3wh About McAfee Labs McAfee Labs is the world’s leading source for threat research, threat intelligence, and cybersecurity thought leadership. The McAfee Labs team of 450 researchers collects threat data from millions of sensors across key threat vectors—file, web, message, and network. It then performs cross-vector threat correlation analysis and delivers real-time threat intelligence to tightly integrated McAfee endpoint and network security products through its cloud-based McAfee Global Threat Intelligence service. McAfee Labs also develops core threat detection technologies—such as McAfee DeepSAFE technology, application profiling, and graylist management—that are incorporated into the broadest security product portfolio in the industry. http://www.mcafee.com/us/mcafee-labs.aspx - ENDS - About McAfee McAfee, part of Intel Security and a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com Note: McAfee is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others. LG partners with McAfee to bring anti-theft feature to LG G3 2014-06-12T02:19:23Z lg-partners-with-mcafee-to-bring-anti-theft-feature-to-lg-g3 SYDNEY, Australia, June 12, 2014 – Today McAfee, part of Intel Security, and LG Electronics announced that the new LG G3 will come pre-installed with a version of McAfee Mobile Security that includes a new anti-theft feature designed to protect users from unauthorised factory resets.  The Kill Switch provides users the ability to disable their phones remotely in the event of device loss or theft. The software allows content to be wiped to prevent personal information from being compromised. Smartphones have become a target for criminals of all types because of the monetary value they hold and the vast amount of personal data consumers store on them.  The growing prevalence of malware is also a concern for mobile users, with findings from McAfee’s Consumer Mobile Security Report showing that the total Android “zoo” of mobile malware rose 197 percent between December 2012 and December 2013. “We are working with McAfee to offer a customised version of its award-winning mobile security software that leverages built-in LG capabilities to make security an integral part of LG G3,” said Dr. Ramchan Woo, head of smartphone planning division of LG. “The implementation of the Kill Switch feature is just one of several specific measures we are taking to ensure that our users can easily and comprehensively protect themselves from the growing threat landscape, both physical and online.” Through a multiyear global partnership, LG G3 is now equipped with a distinct version of McAfee Mobile Security to provide users with an easy and comprehensive way to protect themselves from security and privacy threats and identity theft. Antivirus, data backup, remote lock and wipe, and remote tracking are all available through the McAfee app for five years at no cost. The Kill Switch feature offers an added layer of protection by allowing the user to retain control of the device even in the event it’s lost or stolen. The McAfee Mobile Security lock screen blocks factory resets and rooting attempts, requires password authentication, and can be controlled by the user from the device or the a web console. “We are working with LG to build and implement unique security measures that empower users to live a safer, worry-free digital life,” said John Giamatteo, senior vice president and general manager, McAfee consumer business. “Partnering with global mobile leaders such as LG is one of the many ways that we’re working tirelessly to deliver innovative solutions that enable safer mobile computing for consumers.” McAfee Mobile Security has been pre-installed and the Kill Switch feature automatically activated on LG G3 phones starting May 28th.  All other LG users may download McAfee Mobile Security for free on the Google Play Store. ENDS McAfee Mobile Security McAfee Mobile Security for Android is designed to prevent privacy invasions, data loss, identity theft and lost or stolen devices.  In AV-Test’s most recent effectiveness test for mobile security products, McAfee Mobile Security received a 100% detection score for the second time this year and was given a top ranking among the 30 vendors that participated in the independent test.  About McAfee McAfee, part of Intel Security and a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://au.mcafee.com/ ### Note: McAfee is a registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others. McAfee urges consumers to take careful “app-roach” at Mobile Expo Asia 2014-06-11T03:56:59Z mcafee-urges-consumers-to-take-careful-app-roach-at-mobile-expo-asia SYDNEY, Australia, June 11, 2014 – With the rise in both mobile malware and apps designed to collect personally identifiable information, McAfee, part of Intel Security, warns mobile users to think twice before downloading apps. McAfee’s security warning is a timely reminder as Mobile Asia Expo brings together industry leaders in mobile communications to address challenges and innovations facing the industry. “In recent years, mobile and tablet devices have become the number one way in which we connect to the Internet, use social media sites, conduct online banking and make financial transactions on the go. McAfee has found that privacy-invading apps dominate the landscape, some containing malware, and many leveraging ad libraries to target unsuspecting app users,” says Sean Duca, Chief Technology Officer, McAfee Asia Pacific, part of Intel Security. Apps and Privacy Recent McAfee research shows that an alarming amount of mobile users are allowing apps to mine their personal data in exchange for use of the app. Over half (51 per cent) of users allow access their photos, 43 per cent to personal contact information and a further 38 per cent allow access to their phone’s contact list – sharing contact details for friends, family and colleagues.[1]  McAfee also found that 82 per cent of apps track you, and 80 per cent of apps collect location information.[2] “While most apps are completely safe to use, some apps have a covert mission – to collect and share information on users. It is because of this, we are worried about the level of personal information that users are naturally willing to share with apps without concern,” says Duca. Apps and Malware Recent reports have shown that, globally, 2.4 million new mobile malware samples were added in 2013, up 190 per cent from 2012.[3] Across the Asia Pacific Region, mobile users in India, Russia, and Japan encountered the most malicious code.[4] One of the most common behaviours – shown by more than one-third of the malware – is to collect and send device data that can be used to build a profile of the mobile device owner’s behaviour. There’s also a high prevalence of acts commonly associated with device hijacking, such as making the mobile device into a bot and installing other, even more malicious malware. “Just one malware infection could have a devastating effect on a user’s phone, blocking access to contact details, phone usability or it could be programmed to skim personal information without their knowledge. It could also impact other devices on a home or community network,” says Duca. Free Mobile Security To combat the dramatic rise in the number of malware targeting mobile devices and to make security a more integrated part of the consumer experience, McAfee offers a full-featured version of its award-winning McAfee Mobile Security, available at no cost in 30 languages. The latest version of McAfee’s free security app for Android and iOS devices enables consumers to instantly run free privacy and security scans. This new version of McAfee Mobile Security now also allows users to easily remove apps that pose significant risks. App Scams To Watch Out For ·       Mobile Shopping Apps – Official looking shopping apps, including those that feature celebrity or company endorsements, could be malicious, designed to steal or send out your personal data.  Criminals can redirect incoming calls and messages, offering them the chance to bypass two-step authentication systems where the second step involves sending a code to a mobile device. ·       Mobile SMS Scams – FakeInstaller tricks Android users into thinking it is a legitimate installer for an application and then quickly takes advantage of the unrestricted access to smartphones, sending SMS messages to premium rate numbers without the user’s consent. ·       Gift Scams – In-app advertisements that offer deals on must-have items, such as the PS4 or Xbox One, might be too good to be true.  Clever criminals will post dangerous links and phony contests to entice users to reveal personal information or download malware onto their devices. McAfee Tips On Protecting Your Privacy McAfee has identified key tips to help safeguard your privacy either via apps or online: ·       Don’t just give away your privacy.  Look at the permissions apps ask for and don’t download apps that ask for personally identifiable information (PII) or extra permissions beyond the ones the app itself needs. ·       Beware of apps that scour your device for interesting information they should never share – such as ‘users you may know’, locations and friend’s contact details to ‘share updates’. ·       Download McAfee Mobile Security – it’s free for Apple and Android devices ENDS About McAfee McAfee, part of Intel Security and a wholly owned subsidiary of Intel Corporation (NASDAQ: INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its visionary Security Connected strategy, innovative approach to hardware-enhanced security, and unique global threat intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://au.mcafee.com/ ### Note: McAfee is a registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others. [1] McAfee Love, Relationships & Technology research, February 2014 [2] McAfee Mobile Security Report, February 2014 [3] McAfee Labs Threats Report, Fourth Quarter 2013 [4] McAfee Mobile Security Report, February 2014 Trends and technology: Preparing for a more connected future in 2025 2014-06-02T00:01:50Z trends-and-technology-preparing-for-a-more-connected-future-in-2025 Canberra, Australia: Monday, 2 June 2014 – McAfee, part of Intel Security, has released its first Safeguarding the Future of Digital Australia in 2025 report which found that only a third of Australians (32 per cent) feel safe and secure in an increasingly connected future. With safety and security on their minds, the report also found that nearly half of Australians (49 per cent) feel a general level of comfort about the rate of technological change, and according to the report, by 2025 technology may have advanced to the point where it is implanted or connected to our physical selves.  The use of human enhancement technologies that monitor our health and improve our natural biological capabilities was also investigated, with 39 per cent of Australians indicating they would be comfortable with devices transmitting personal information directly to health providers. Launched at the start of Stay Smart Online Week, the report was compiled by futurist Ross Dawson on behalf of Intel Security, to provide a forward-looking view into the technology trends and what we can expect over the next decade.   The report also includes a Newspoll survey on Australian attitudes about the role technology plays in their lives, as well as contributions from technology, security, privacy and parenting experts.  Key trends identified in the areas of home, social networking, work and younger generations included: ·       Our homes will nurture and protect us, keep us healthy and may even love us ·       Our reputation, personal opportunities and identity will be shaped by our participation in social media ·       There will be big winners and losers as collaborative technologies, robots and artificial intelligence transform the nature of work ·       The brains of tomorrow’s adults may be networked to technology, transforming how they learn and interact Welcoming the report, Federal Minister for Communications, Hon. Malcolm Turnbull MP said, “Intel Security’s report makes a major contribution to our understanding of how to safeguard Australians online and into the future.”  Parliamentary Secretary to the Minister for Communications, The Hon. Paul Fletcher MP, launched Intel Security’s Safeguarding the Future of Digital Australia in 2025 report in Canberra, saying, “This report makes a valuable contribution to our understanding of how government, industry and the community can be prepared for our digital future.” Keith Buckley, Managing Director for McAfee Australia and New Zealand, part of Intel Security, believes the report has delivered rich insight into what our digital lives might look like in 2025.  “By seeking to understand how we’ll interact with technology over the next decade in our homes, at work, via online connections and how our young people will develop along side technology, we can better prepare for both the benefits and risks that closer connectivity will bring,” says Buckley.  “There is no doubt that technology is advancing and innovating, presenting opportunities and challenges for governments, businesses and consumers. However, Australians have a right to feel safe and secure about their connected future and trust that they have control over their digital information and privacy,” he says. Sean Duca, Chief Technology Officer for McAfee Asia Pacific, part of Intel Security, says, “With the rapid changes and advancement in technology that collects and shares personal information, security cannot be an afterthought. When you add that we may be implanting technologies into our bodies and relying on them for enhanced function, and to keep ourselves healthy, it becomes even more imperative that we can trust them and that we enable a safe future.”  Online identities According to the Safeguarding the Future of Digital Australia in 2025 report, unbounded online socialisation will shape young identities as digital connectivity and technology implants may become the norm. However, Australians are not yet comfortable about this prospect, with two thirds (68 per cent) indicating that they would be concerned if young people’s sense of identity were defined by their online persona and interactions.  Australians are also uncomfortable that their reputations and personal opportunities will be shaped by their participation in social media. More than half (54 per cent) said it would be unfair for financial credit ratings or job opportunities to be based on their online reputation. “What the report highlights is that 10 years from now we will have an increased ability to collect information on our everyday lives and will likely live in a more openly sharing culture, but that we are also concerned about a lack of privacy and maintaining a sense of self that is separate from our online identities,” says Michelle Dennedy, Chief Privacy Officer for McAfee, part of Intel Security. “Starting now, our digital lives must include controls around privacy so that we define and decide our level of participation and set acceptable boundaries that will help shape our online person and reputation,” she said. Rate of change and quality of life Australians are concerned about the impact technological advances are having on quality of life, with only a third (33 per cent) saying technology is making life simpler rather than more complicated, and 44 per cent believe that robotics and intelligent technology in the home would make their quality of life worse. Fifty per cent are comfortable with the current pace of technological change. “It’s hard to conceive how technology could make such a huge impact on our lives, but with the current rate of change, the next 10 years will see many innovations and adoptions we can’t yet imagine,” says Safeguarding the Future of Digital Australia in 2025 report author, futurist and CEO of Advanced Human Technologies Group, Ross Dawson. “By 2025, there will be opportunities for increased sharing and connectedness in everything we do — our homes will be smart and feature robotics that help with household tasks and look after us and our families. Our work environments and interactions will be more global thanks to virtual reality, and cognitive function for upcoming generations will evolve differently as they accommodate technology into their everyday activity,” says Dawson. Preparing future generations In his predictions on future trends of technology, Dawson indicates that today’s approach to schooling will be challenged by highly connected children, many of whom will learn faster than the pace of the classroom and be intensely frustrated by antiquated structures for learning.  The research, however, highlights that nearly half of Australians would be concerned about children being educated at their own pace via online tools. Although, a significant portion of those surveyed (27 per cent) think it would be a good for children, and this positive sentiment is higher among those with children (33 per cent) than those without (24 per cent). Keith Buckley says keeping the next generations and our future leaders engaged and safe in a highly digital world needs to be a community effort. “McAfee works hand-in-hand with government, police, educators such as Life Education Australia, as well as parents, to teach kids to be safe and respectful digital citizens,” concludes Buckley. For more information, please visit http://www.intelsecurity.com and www.mcafeecybered.com  -ENDS- Notes to Editors: Available for interview ·       Ross Dawson, Futurist, CEO of Advanced Human Technologies Group and author of Safeguarding the Future of Digital Australia in 2025 ·       Sean Duca, Chief Technology Officer Asia Pacific, McAfee Part of Intel Security ·       Michael Sentonas, VP & Chief Technology Officer Security Connected, McAfee. Part of Intel Security ·       Michelle Dennedy, Global Chief Privacy Officer, McAfee. Part of Intel Security ·       Dr Justin Coulson, Parenting Psychologist About McAfee McAfee, part of Intel Security and a wholly owned subsidiary of Intel Corporation (NASDAQ: INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its visionary Security Connected strategy, innovative approach to hardware-enhanced security, and unique global threat intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com BlueAnt PUMP HD Sportsbuds – Train, Play, Live Unleashed 2014-04-11T01:52:42Z blueant-pump-hd-sportsbuds-train-play-live-unleashed Sydney – April 1, 2014 – BlueAnt Wireless, a leading innovator in Bluetooth audio solutions, announces the launch of PUMP HD Sportbuds – delivering unrivaled audio for intense activity and extreme conditions. Featuring best-in-class wireless range, PUMP delivers crystal clear audio and is currently the only set of wireless sport earbuds to carry the IP67 waterproof distinction. The military-grade, rugged design protects the premium audio components from rain, dust, debris, sweat and even a rinse under the tap at the end of workouts.  Developed under Australian conditions over the span of nearly three years and in collaboration with extreme athletes and performance fitness enthusiasts, PUMP delivers deep, thumping sound that is designed to let the beat set the pace. On the road, in the gym or cranking down rugged single-track trails, the PUMP will bring new meaning to the most intense workouts. BlueAnt CEO Taisen Maddern says, “We wanted to build a headphone for active people who feed off their music and let the rhythm fuel where they go and how hard they push themselves – no matter the conditions.” Energize HD Audio PUMP redefines Bluetooth audio, creating a breakthrough audiophile-grade music experience that cannot be matched by wireless rivals. Thundering bass, smooth mids, crisp treble, and sharp, yet subtle highs together comprise Energize HD Audio, making PUMP better sounding and more heart-pumping than anything sports-audio to date. While delivering a wired headphone-like quality music experience was the lodestar of the PUMP development team, BlueAnt has also equipped PUMP with the world-class microphone capabilities millions of customers have come to expect from the Bluetooth communications expert. This enables users to take calls in crystal-clear stereo using the integrated audio controls for simple and activity-friendly control of calls and music. Rugged Design Encased in the same military-grade Kevlar shielding used in bullet-proof vests and coated with Teflon that repels liquids on commercial cooking equipment, the BlueAnt team went to extreme lengths to make sure listeners could feel confident exposing their music to the elements. PUMP is the only one within its category that qualify for an IP67 rating, protecting the precision-tuned components by keeping out water and debris. The products durability is achieved by the 12.5mm diameter drivers, Mylar composite diaphragms, Neodymium magnets and overhung voice coils used in the device to endure intense and extreme conditions. While the PUMP can be immersed in up to 3 feet of water for up to 30 minutes, it is not designed for swimming as Bluetooth signal does not travel under large volumes of water. Range & Comfort Train, play and live untethered from your Bluetooth enabled device, eliminating concern of cords getting caught on gym equipment or tangled whilst you are on the court. Whether circuit training, shooting hoops or skiing down slopes, you can enjoy the complete freedom of movement, carefree about your sportsbuds slipping out or falling off, providing you with the confidence to train with intensity. The set includes an assortment of ergonomically designed ComfortSeal tips and Comply™ Premium Awareness tips to let in ambient sound for added safety and stabilisers for an even more secure fit.  “We knew we did our job right when people came back saying it doesn’t even feel like they’re wearing headphones while participating in the most grueling, sweat-intensive activities,” said BlueAnt’s Chief Technology Officer, Dr. Alex Talevski.   Battery Life Designed for the hardcore fitness enthusiast and those who lead active lifestyles outside of the gym, PUMP features a rechargeable lithium-ion battery capable of holding 8 hours of continuous playtime per charge ensuring you have the juice needed to outlast the most strenuous workouts. Listener fatigue is a real issue for the highly active, so every effort was made to minimise friction and improve balance, while providing rock-solid stability. PUMP HD Sportbuds are available in two colors, Black and Green Ice, for $149.95 through all Harvey Norman stores and online at http://www.blueant.com.au. NOTES TO EDITOR: For hi-res image downloads, please visit www.blueant.com.au/about/gallery.php  About BlueAnt Wireless BlueAnt is a global communications company dedicated to connecting people to the sounds that keep them advancing confidently through life. From delivering pulse-pounding beats to push someone beyond their limits to making sure every detail of a career-changing call is received without interruption, we feel audio sits atop the five senses. Our devices integrate highly advanced technology in such a way as to not overpower the user. We innovate when it will improve the customer experience, not for the sake of innovation itself. For more information, visit www.blueant.com.au and follow BlueAnt on www.facebook.com/BlueAntWireless and on Twitter, @MyBlueAnt. Media Contact For further information please contact Zing: Shelby Gemmola, 02 8303 6464, shelby@zing.net.au MCAFEE DEFINES STRATEGY FOR SECURING THE INTERNET OF THINGS 2014-04-10T01:25:04Z mcafee-defines-strategy-for-securing-the-internet-of-things McAfee, part of Intel Security, today outlined its strategy for enabling the secure Internet of Things. Utilising McAfee’s history of securing the most demanding digital environments, McAfee is building and delivering future-focused security solutions that are essential to unleashing the transformative power of a world in which every device is connected. Companies of all sizes are linking objects as diverse as smartphones, cars and household appliances to industrial sensors. The installed base of the Internet of Things will be approximately 212 billion "things" globally by the end of 2020, according to IDC[1]. This equates to approximately 27 things for every person on Earth that will need to be secured and managed.  McAfee’s objective is to maintain the trust of these devices while allowing them to perform as intended but with a richer experience. While this connectivity brings convenience and opens a world of opportunities it also creates unprecedented security challenges in data privacy, safety, governance and trust.  McAfee is addressing these challenges by providing long-term assured functionality and other core security capabilities for the vast array of current and future IoT use cases.To effectively secure these IP connected devices requires that security be designed in and not an afterthought.  A comprehensive IoT strategy includes: ·      A secure and holistic solution for information rich environments across multiple environments and devices ·      Assurance that devices are operating as intended by the manufacturer and have not been corrupted ·      Life cycle security across the device, network, and data center ·      Support for industry standards and device interoperability ·      Ability to solve Information Technology/Cloud services challenges in connecting legacy and new systems to new and future services ·      Provide technology to assure individual privacy Drawing from its 20 plus year history in IT security, McAfee is applying this knowledge and expertise to the evolving IoT market.  McAfee is working closely with the broader Intel and Wind River companies to provide security solutions to ensure connected devices, systems, applications, and data are protected, freeing companies to concentrate on their business. Last week, Intel introduced the Intel Gateway Solutions for IoT, a family of platforms based on Intel® Quark™ and Atom™ processors, as well as McAfee and Wind River software that enables companies to seamlessly interconnect industrial devices into an IoT-ready system of systems.  Additionally McAfee has over 400 OEM partners across the Industrial, Retail and Healthcare verticals.  “McAfee has both the breadth and the depth of security offerings needed to support the complexity and massive scale of the Internet of Things,” said Steve Hoffenberg, Director of M2M Embedded Software and Tools at VDC Research.  “With the company’s strong collaborations with Intel and Wind River, as well as its long history of securing information technology, McAfee is well positioned to proactively address the security needs of the IoT.” McAfee is focused on addressing security challenges specific to the Internet of Things, including expanded requirements for trust, solution integrity, accountability and privacy.  These solutions must deliver interoperable security which establishes appropriate and effective protection as every layer including the device connection and the cloud.         “Security needs to be built in as the foundation of the Internet of Things,” said Michael Fey, worldwide chief technology officer for Intel Security.  “Any disruption to these IP connected devices can cause damage to the business and our daily lives. We need to have foresight into what is coming so we can prevent against threats and securely manage these devices.McAfee is enabling the future and the possibilities that the Internet of Things brings to our daily lives.”   To learn more about what McAfee is doing to enable a secure Internet of Things, visit www.mcafee.com/embedded.   About McAfee McAfee, part of Intel Security and a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com [1] IDC: Worldwide Internet of Things (IoT) 2013–2020 Forecast: Billions of Things, Trillions of Dollars (IDC #243397) CONTROVERSY SURROUNDING ADVANCED EVASION TECHNIQUES LEADS TO HIGH PRICE TAG FOR BUSINESSES 2014-04-01T08:26:26Z controversy-surrounding-advanced-evasion-techniques-leads-to-high-price-tag-for-businesses Sydney, Australia – A new report by McAfee, a division of Intel Security, examines the controversy and confusion surrounding Advanced Evasion Techniques (AETs), and the role that they play in Advanced Persistent Threats (APTs).   A Vanson Bourne study, commissioned by McAfee, surveyed 800 CIOs and security managers from the United States, United Kingdom, Germany, France, Australia, Brazil, and South Africa, and showed that there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with protecting sensitive data.   Recent high profile data breaches have demonstrated that criminal activity can still evade detection for long periods of time. Survey respondents acknowledged this and more than one in five security professionals admit their network was breached (22 per cent). Nearly 40 per cent of those breached believe that AETs played a key role. On average, those who experienced a breach in the last 12 months reported a cost to their organisation of upwards of $1 million.   “We are no longer dealing with the random drive-by scanner that is just looking for obvious entryways into your network. In today's interconnected world, we are dealing with adversaries who spend weeks or months studying your public facing network footprint, looking for that one small sliver of light which will allow them to gain a foothold into your networks,” said John Masserini, vice president and chief security officer, MIAX Options.   “Advanced evasion techniques are that sliver of light. When deployed, McAfee’s Next Generation Firewall technology adds an extra layer of depth to protect against such threats, making that sliver of light that much harder to find,” says Masserini.   Why Current Firewall Tests Hide the Existence of AETs Nearly 40 per cent of IT decision-makers do not believe they have methods to detect and track AETs within their organisation, and almost two thirds said that the biggest challenge when trying to implement technology against AETs is convincing the board they are a real and serious threat.   “Many organisations are so intent on identifying new malware that they are falling asleep at the wheel toward advanced evasion techniques that can enable malware to circumvent their security defences,” said Jon Oltsik, senior principal analyst, Enterprise Strategy Group.   “AETs pose a great threat because most security solutions can’t detect or stop them. Security professionals and executive managers need to wake up as this is a real and growing threat,” says Oltsik. Of the estimated 800 million known AETs, less than one per cent is detected by other vendor’s firewalls. The prevalence of these techniques has risen significantly since 2010 with millions of combinations and modifications of network based AETs having been identified to date.   Professor Andrew Blyth of the University of South Wales has studied the prevalence and impact of AETs for many years. “The simple truth is that advanced evasion techniques are a fact of life.It’s shocking that the majority of CIOs and security professionals severely underestimated that there are 329,246 AETs, when in fact the total of known AETs is approximately 2,500 times that number or more than 800 million AETs and growing,” said Blyth.   AETs are methods of disguise used to penetrate target networks undetected and deliver malicious payloads. They were first discovered in 2010 by network security specialist Stonesoft, which was acquired by McAfee in May 2013. Using AETs, an attacker can split apart an exploit into pieces, bypass a firewall or IPS appliance, and once inside the network, reassemble the code to unleash malware and continue an APT attack.   The reason these techniques are under-reported and not well understood is that in some paid tests, vendors are given the chance to correct for them. As such, only the specific techniques identified are corrected for, and not the broader techniques that are rapidly updated and adapted by criminal organisations.   “Hackers already know about advanced evasion techniques and are using them on a daily basis,” said Pat Calhoun, general manager of network security at McAfee. “What we’re hoping to do is educate businesses so they can know what to look for, and understand what’s needed to defend against them.”   High Costs to Organisations Respondents whose organisations had experienced a network breach in the past 12 months estimate the average cost to the business to be $931,006. Australia, which reported a lower number of breaches at 15 per cent, indicated a much higher average cost per breach at $1.5 million. The cost to American respondents also exceeded $1 million on average. The hit to the financial services sector was the hardest, with estimated cost to be over $2 million per breach globally.   To download a copy of the full report, executive summary and infographic, please visit www.mcafee.com/AET.   About McAfee McAfee, a division of Intel Security and a wholly owned subsidiary of Intel Corporation (NASDAQ: INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its visionary Security Connected strategy, innovative approach to hardware-enhanced security, and unique global threat intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com ### Note: McAfee is a registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others. MCAFEE LABS Q4 REPORT REVEALS TECHNIQUES USED IN HIGH-PROFILE DATA BREACHES 2014-03-10T05:42:20Z mcafee-labs-q4-report-reveals-techniques-used-in-high-profile-data-breaches SANTA CLARA, Calif. – 10 March 2014 – McAfee Labs today released the McAfee Labs Threats Report: Fourth Quarter 2013, highlighting the role of the “dark web” malware industry as a key enabler of the high-profile point-of-sale (POS) attacks and data breaches in the fall of 2013. The report brings to light the growing ease of purchasing POS malware online, and selling stolen credit card numbers and other personal consumer data online. McAfee Labs also saw the number of digitally signed malware samples triple over the course of 2013, driven largely by the abuse of automated Content Distribution Networks (CDNs) that wrap malicious binaries within digitally signed, otherwise legitimate installers. McAfee Labs believes this accelerating trend could pose a significant threat to the long-established certificate authority (CA) model for authenticating “safe” software.  Detailed research of the high-profile Q4 credit card data breaches found that the POS malware used in the attacks were relatively unsophisticated technologies likely purchased “off the shelf” from the Cybercrime-as-a-Service community, and customized specifically for these attacks. McAfee Labs’ ongoing research into underground “dark web” markets further identified the attempted sale of stolen credit card numbers and personal information known to have been compromised in the Q4 retail breaches. The researchers found the thieves offering for sale some of the 40 million credit card numbers reported stolen in batches of between 1 million and 4 million at a time. “The fourth quarter of 2013 will be remembered as the period when cybercrime became ‘real’ for more people than ever before,” said Vincent Weafer, senior vice president for McAfee Labs. “These cyber thefts occurred at a time when most people were focused on their holiday shopping and when the industry wanted people to feel secure and confident in their purchases. The impact of these attacks will be felt both at the kitchen table as well as the boardroom table.  For security practitioners, the ‘off the shelf’ genesis of some of these crime campaigns, the scale of operations, and the ease of digitally monetizing stolen customer data all represent a coming of age for both Cybercrime-as-a-Service and the ‘dark web’ overall.”  By the end of 2013, McAfee Labs saw the number of malicious signed binaries in our database triple, to more than 8 million suspicious binaries. In the fourth quarter alone, McAfee Labs found more than 2.3 million new malicious signed applications, a 52 percent increase from the previous quarter.  The practice of code signing software validates the identity of the developer who produced the code and ensures the code has not been tampered with since the issue of its digital certificate.  Although the total number of signed malware samples includes stolen, purchased, or abused certificates, the vast majority of growth is due to dubious CDNs. These are websites and companies that allow developers to upload their programs, or a URL that links to an external application, and wrap it in a signed installer.  The McAfee Labs team warns that the growing number of maliciously signed files could create confusion among users and administrators, and even call into question the continued viability of the CA model for code signing.  “Although the expansion of the CA and CDN industries has dramatically lowered the cost of developing and issuing software for developers, the standards for qualifying the identity of the publisher have also decreased dramatically,” said Weafer. “We will need to learn to place more trust in the reputation of the vendor that signed the file, and less trust in the simple presence of a certificate.”   Additional Q4 2013 Findings ·       Mobile malware.McAfee Labs collected 2.47 million new mobile samples in 2013, with 744,000 in the fourth quarter alone. Our mobile malware zoo of unique samples grew by an astounding 197 percent from the end of 2012.  ·       Ransomware.The volume of new ransomware samples rose by 1 million new samples for the year, doubling in number from Q4 2012 to Q4 2013.  ·       Suspicious URLs. McAfee Labs recorded a 70 percent increase in the number of suspect URLs in 2013.  ·       Malware proliferation. In 2013, McAfee Labs found 200 new malware samples every minute, or more than three new threats every second.  ·       Master boot record-related. McAfee Labs found 2.2 million new MBR-attacks in 2013.  Each quarter, the McAfee Labs team of 500 multidisciplinary researchers in 30 countries follows the complete range of threats in real time, identifying application vulnerabilities, analyzing and correlating risks, and enabling instant remediation to protect enterprises and the public.  To read the full McAfee Labs Threats Report: Fourth Quarter 2013, please visit: http://mcaf.ee/qw7fe    About McAfee Labs McAfee Labs is the world’s leading source for threat research, threat intelligence, and cybersecurity thought leadership. The McAfee Labs team of 500 researchers collects threat data from millions of sensors across key threat vectors—file, web, message, and network. It then performs cross-vector threat correlation analysis and delivers real-time threat intelligence to tightly integrated McAfee endpoint and network security products through its cloud-based McAfee Global Threat Intelligence service. McAfee Labs also develops core threat detection technologies—such as McAfee DeepSAFE technology, application profiling, and graylist management—that are incorporated into the broadest security product portfolio in the industry. http://www.mcafee.com/us/mcafee-labs.aspx About McAfee McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com Note: McAfee is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others. ###   MCAFEE DELIVERS ON INTEL VISION OF FREE MOBILE SECURITY FOR CONSUMERS 2014-02-24T10:51:25Z mcafee-delivers-on-intel-vision-of-free-mobile-security-for-consumers-1 mcafee delivers on intel vision of free mobile security FOR CONSUMERS Full-Featured Version of Award-Winning McAfee Mobile Security Empowers a Safe Digital Life   NEWS HIGHLIGHTS ·      McAfee announces details of free protection for consumers on any Android and iOS mobile device ·      Free version of McAfee Mobile Security for Android includes new enhanced privacy features, new Wi-Fi protection and support of Intel® Device Protection Technology ·      McAfee has also made available a free iOS version of McAfee Mobile Security providing iPhone and iPad users a new array of privacy features and enhanced protection against device theft or loss ·      New study reveals the latest threats to mobile users ·      New mobile and cross-device partnerships with Verizon and LG   Mobile World Congress, Barcelona, Spain –Feb. 24, 2014 – Today McAfee announced a full-featured version of its award-winning McAfee Mobile Security is now available at no cost in 30 languages, as part of an Intel Corporation initiative to make security a more integrated part of the consumer experience. The free version of McAfee’s security app for Android includes enhanced protection features and, for the first time, unlocks security extensions for Intel-based mobile devices, making it the most comprehensive free mobile solution for consumers on the market. McAfee also recently launched McAfee Mobile Security for iOS, which is also available free of charge.   Earlier this year at the International Consumer Electronics Show in Las Vegas, Intel CEO Brian Krzanich announced plans to offer elements of McAfee’s award-winning security solutions for mobile devices for free, and today’s announcement is an important milestone in that plan.   “We live in an unprecedented era of always-connected devices, where security and privacy protection are fundamental,” said John Giamatteo, senior vice president and general manager, McAfee consumer business. “With free access to our award-winning mobile security product, consumers are free to experience everything this connected world has to offer, without fear of their personal information being compromised.”   McAfee Mobile Security Now Available Free for Consumers McAfee Mobile Security, available for immediate download in the Google Play Store, now offers its comprehensive, award-winning protection against privacy and security threats at no cost to consumers. According to McAfee’s findings from the 2014 Love, Relationships & Technology survey, consumers are sharing and storing more information than ever, without taking the necessary steps to protect their mobile devices.   With privacy and identity in mind, McAfee Mobile Security for Android is designed to prevent privacy invasions, data loss, identity theft and device disappearances. It includes anti-theft, anti-virus, app protection, Web protection, call and SMS filtering. In AV-Test’s most recent effectiveness test for mobile security products, McAfee Mobile Security received a 100% detection score and was given a top ranking among the 30 vendors that participated in the independent test.   McAfee recently launched McAfee® Mobile SecurityforiOS devices, featuring a number of comprehensive protection options previously available only to Android users. Available for free, the software provides iPhone and iPad users with a secure vault for private content, secure camera, jailbreak detection, backup capabilities and more.   Enhanced McAfee Mobile Security Android malware almost tripled from 2012 to 2013, according to McAfee’s third Consumer Mobile Security Report.  The latest version of McAfee Mobile Security, including the free version, is now equipped with several new features that are designed to protect consumers against security vulnerabilities and address the problems created by lost or stolen devices. The new Wi-Fi Security feature allows users to connect to any Wi-Fi network with confidence, knowing that McAfee will alert them to any risky or non-password protected networks that they may be connecting to.   In 2012, 1.6 million Americans fell victim to smartphone theft, and stolen mobile phones cost consumers over $30 billion¹. To combat this, when there is suspicious activity such as multiple incorrect attempts to unlock the device, users can activate a new CaptureCam to snap a picture of the person holding the device. The picture, along with the location, is sent to the account owner, revealing who is in possession of the lost or stolen device. A new SOS feature will also save the last location of a device before the battery runs out.   McAfee Mobile Security now provides new kernel-level security extensions through integration with Intel Device Protection Technology.This technology helps to proactively block and secure devices from malware delivered through malicious applications and websites while minimising impact to performance and conserving battery power, when paired with a security service such as McAfee Mobile Security.   Industry Leadership McAfee is expanding its mobile footprint by continuing to partner with some of the industry’s top global brands. Verizon and LG have just been added to its list of over 110 partners. By partnering with these leading brands, both companies are coordinating and leveraging their strengths to help keep consumers safe while connecting with their mobile devices.   McAfee at Mobile World Congress At Mobile World Congress, McAfee and Intel will be providing demos of McAfee Mobile Security at the Intel booth #3D30, Hall 3.   About McAfee McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. McAfee delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. More information is available at www.mcafee.com.   ### Note: McAfee is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others.   ¹ Press Release from San Francisco District Attorney’s Press Office: http://www.sfdistrictattorney.org/index.aspx?page=262