What Can We Expect in 2013?

The cybercrime landscape is always growing and changing as hackers look for new ways to make money from us. And 2012 was no different as McAfee Labs™ found huge growth in malicious software and activities.

As the year closes, McAfee Labs looks ahead to see what is on the horizon for 2013. Here’s the areas they predict that we’ll see growth in and that consumers should be aware of.

Malicious app proliferation
As mobile malware grows, we expect to see malicious apps that can buy additional apps from an app store without your permission. Buying apps developed by malware authors puts money in their pockets. We also expect to see attacks that can happen without you having to install an app, so no interaction on your part is needed to spread the malicious app.

Mobile “tap and pay”
Phones with near-field communications (NFC) enabled are becoming more common. As users are able to make “tap and pay” purchases in more locations, they’ll carry their digital wallets everywhere. That flexibility will, unfortunately, also be a boon to thieves Thieves will also use the “bump and infect” method to steal money from your digital wallets in large, crowded areas like airports, malls and theme parks.

Mobile ransomware
Ransomware is quickly moving from the PC to mobile devices. Criminals hijack your ability to access data on your phone or use of your phone, so you are faced with losing your contacts, calls, photos, etc. or paying a ransom; and even when you pay the ransom you don’t always get your data back.

Regaining control of botnets
Botnets are networks of infected computers, that are controlled by a criminal for malicious activities and they are one of the largest sources of spam emails. As cooperation to shut down these botnets grows, the criminals that control these botnets lose money. We anticipate that hackers will find ways to regain control of their botnets (a larger group of computers they have control over) once they are taken down.

Hacking services traded online
Online criminal forums have always been used by cybercriminals to buy and sell malicious services, but they still did most of their actual dealings face to face. In 2013, the growth of traditional e-commerce methods are being used, and anonymity on these sites has improved. Buyers can make their choices with the click of a mouse, use an anonymous online payment method, and receive their purchases without any negotiations or direct contact with the seller.

 

 

 

 

 

 

 

 

 

 

Here’s some 2013 security resolutions:

Install security software on your mobile device—With the growing amount of mobile threats that we’re seeing, you want to make sure that your smartphone is protected, just like your computer. Consider installing security software such as McAfee Mobile Security, which can guard against viruses and malware, as well as protect your device and information in the case of loss or theft.

Strengthen your passwords—If you’re still using easy to remember passwords that include your home address and pet’s name, it’s time to get serious about creating strong passwords that are at least eight characters long, and a combination of numbers, letters and symbols. Don’t include any personal information that can be guessed by hackers.

Make sure that all of your software is up-to-date— Software updates often include fixes to security holes and other vulnerabilities so you want to make sure that you have the latest version of all your software programs, especially security software. Also, make sure to download application updates when prompted.

Check your bank statements and mobile charges regularly—This way, you can discover and report any suspicious charges.

Finally, as cybercriminals continue developing new attacks, realize that you need to stay up-to-date on the latest threats and how to protect yourself.

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  (Disclosures)

Credit Card Fraud Really Isn’t Identity Theft

With the holiday shopping season and after holiday season sales over, it’s time to review our credit card statements and make sure that everything that is on there was something you purchased. With most of us using our card a lot more during this time, there’s more chance of fraud or identity theft.

When most of us think of identity theft and being a victim of identity theft, we are really referring to credit card fraud. This form of credit card fraud is called account takeover and it occurs when a thief gains access to your credit or debit card number through criminal hacking, dumpster diving, ATM skimming, or perhaps you simply hand it over when paying at a store or restaurant.

Another form of credit card fraud is called new account fraud. This occurs when someone gains access to your name, address and, in the US, your Social Security number. With this data, a thief can open a new account and have the card sent to a different address. This is true identity theft as the thief has access to your personally identifiable information.

Once the identity thief receives the new card, he or she maxes it out and doesn’t pay the bill. Over time, the creditors track you down, hold you accountable for the unpaid bills, and demand the owed funds. New account fraud destroys your credit and is a mess to clean up.

Victims of account takeover are likely to discover the fraud in numerous ways. They may notice suspicious charges on a credit card statement, or the credit card company may notice charges that seem unusual in the context of the victim’s established spending habits.

Credit card companies have anomaly detection software that monitors credit card transactions for red flags. For example, if you hand your credit card to a gas station attendant in Boston at noon, and then a card present purchase is made from a tiny village in Romania one hour later, a red flag is raised. Common sense says you can’t possibly get from Boston to Romania in one hour. The software knows this.

Victims of account takeover only wind up paying the fraudulent charges if they don’t detect and report the crime within 60 days. During that time, you are covered by a “zero liability policy,” which was invented by credit card companies to reduce fears of online fraud. Under this policy, the cardholder may be responsible for up to $50.00 in charges, but most banks extend the coverage to charges under $50.00.

After 60 days, though, you are out of luck. So pay attention to your statements. As long as you do, account takeover should not hurt you financially. Protecting yourself from account takeover credit card fraud is relatively easy. Simply make sure you pay attention to your statements every month and refute unauthorized charges for purchases you did not make.

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! See him knock’em dead in this identity theft prevention video. Disclosures.

 

Top 10 Security Considerations For New Device

There’s a ton of new devices flooding the market and it has been predicted by the North Pole there have been many good boys and girls this year who will be receiving them. Out of Santa’s sack will come computers, tablets, smartphones, and gaming consoles. But if you happen to get one of these new devices, you should know that the first step in enjoying it is protecting it.

Smartphone or tablet:

Mobile malware is on the rise, and Android is still the most targeted platform.

1. Threats aimed at mobile phones are growing.

o Malicious applications are a main threat area, so be careful of the third-party applications you install— they could end up infecting your phone or sharing your personal information. Only download applications from a reputable app store, and read other users’ reviews. Also, make sure you are aware of what kind of information the app wants to access before you download it.

o Consider mobile malware threat protection to safeguard your device against viruses.

o Apply system or application updates which almost always include security patches and make your devices easier to use.

o Turn off antennas you don’t need. If you’re not using any one of the four typical wireless connections (cellular, Wi-Fi, Bluetooth, and GPS) on your smartphone or tablets then turn them off. It will help keep you safe and give you the best battery life.

o Don’t store personal information, such as passwords and account numbers, on your phone.

o For more information on McAfee® Mobile Security solutions, please visit:  www.mcafee.com/mobilesecurity.

Apple iPad, iPhone or iPod touch: Apple computers and devices has led to escalated threats. Mac malware has risen throughout 2012, and according to McAfee Labs, this trend looks to continue.

2. Transfer your PC best practices to your new Apple computer or device.

o As a proactive measure, consider installing security software that’s been developed for the Mac since more threats are being aimed at this platform.

o Don’t leave your device unattended, allowing a thief to grab it and your sensitive information.

PC or netbook:

3. Make sure your computer has comprehensive security software.

o Your security software should include at a minimum: anti-virus with cloud computing, a two-way firewall, anti-spyware, anti-phishing and safe search capabilities.

o Additional levels of protection include anti-spam, parental controls, wireless network protection, and anti-theft protection that encrypts sensitive financial documents.

o Don’t just use anti-virus software—this alone is not enough.

4. Keep in mind that free software can leave you unprotected.

o Free security software typically provides only basic protection, and is often offered to get you to buy more comprehensive software. Look for security software that provides up-to-date protection using cloud computing which can help protect against emerging threats.

o Don’t forget to check whether the security software installed on your new PC is only a trial version. If it is, remember to buy a subscription so that you have continuous protection against newly discovered threats.

5. Have data protection in addition to comprehensive security.

o In a recent global survey, home Internet users estimated that their digital assets, such as photos, contacts, and entertainment, were worth approximately $37,000, yet more than a third lacked protection across their devices.Consider a product that offers data backup and restore features as well as advanced security in case of a loss.

o Don’t take a chance on losing important personal photos, creative works in progress, or financial information.

6. Search and shop safely.

o You should know that McAfee Labs counted 43.4 million suspect websites during the third quarter of 2012, up 20% over the previous quarter, and these pose a threat to your computer and your devices.

o To help you weed through malicious sites, be sure to use a website safety advisor that can tell you which sites are safe and which are risky. McAfee SiteAdvisor™ is included in all of the McAfee consumer security suites.

o When shopping, look for theMcAfee SECURE™ trustmark, which indicates that the site has passed rigorous daily testing for 10,000 known hacker vulnerabilities.

7. Be aware of “scareware” and “ransomware”

o Scareware tricks users into believing that the computer may be infected to get them to “buy” fake antivirus software and hand over their personal and financial details, usually via pop-ups.

o Ransomware also appears through pop-ups, and typically accuses Web surfers of visiting illegal webpages. These pop-ups claim to be from the police and threaten to lock up the user’s computer system until they pay a fine.

o Ransomware grew by 43% in the third quarter of this year, while scareware continues to thrive, and is estimated to victimize 1 million people a day.

o Don’t buy antivirus software through pop-up ads. Always purchase your security software from a reputable vendor, and keep it up-to-date to avoid ransomware scams.

8. Educate your family and pay attention to your children’s online activities.

o Keep your computer in a common area and discuss which information is appropriate to share online and which is not, such as addresses, phone numbers, and other private information.

o If you have kids or tweens, limit their online access and the content they can view. Use aWeb filtering tool that protects kids from accessing inappropriate content such as pornography, nudity, online hate groups, school cheating sites, and profanity.

o Don’t assume your child doesn’t know how to turn off parental controls.

oFor more information on keeping your kids safe, visit McAfee’s Family Internet Safety Center at www.mcafee.com/family and check out the 10-Step

Internet Safety Plan For Your Family.

Gaming or entertainment device, such as a Nintendo Wii or 3DS, PlayStation 3, and Xbox 360:

9. Keep in mind that these gaming and entertainment devices are now Internet-connected and vulnerable to many of the same threats as PCs.

o Make reliable backup copies of games to protect your investment.

o Take advantage of built-in parental controls that can help shield kids from violent games or limit when the device can be used.

o Some multiplayer games allow kids to play with strangers over the Internet, so if you are a parent consider activity-monitoring tools.

o Only connect your device to a secure Wi-Fi network.

o Don’t store personal information on yourdevice.

Removable storage device, such as a flash drive or portable hard drive:

10. Use technologies that will help protect your information.

o Consider using a secure, encrypted USB stick, to scramble your information so it is unreadable if your device is lost or stolen.

o Buy security software to protect your portable hard drive, and set a password.

o Don’t leave your removable storage device unattended since they are small and easily stolen.

Of course, many of us have multiple devices. To make protecting them easier, consider using a product such as McAfee All Access, which provides the first complete security protection for PCs, Macs and mobile devices in one cost-effective, single solution. To learn more, go to www.mcafee.com/allaccess.

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  (Disclosures)

Losing a Mobile Phone Doesn’t Have To Stink

We’ve all been there. You search your pockets, your belt clip, jacket pockets, every draw, cabinet, bag, couch, and floor, every crevice of your car and dog house.  You wonder if you left it in the bar last night or over your friend’s house. You’d text all your buddies to see if they have it but, well, you can’t.

It’s that horrible feeling that comes over you as you realize you no longer have your mobile phone. In the past you might have first thought of the cost of having to buy a new phone and re-enter all your contacts. But now with the advent of smartphones, there’s much more to lose than the device itself.

Because our mobile devices can hold personal and work contacts, account logins, photos, and messages, losing your device means exposing your private world to strangers and identity thieves. They can browse your apps and activities, extract your addresses, download files and pictures, send all your Facebook friends fake or embarrassing content, or gain access to your bank accounts and drain them. And recreating and restoring all the content we have on our smartphones can take hours, if it is even possible.

I’ve lost count of how many phones I’ve found in bars or parks, at the beach or when running along the trails. And the most amazing part is I’ve been able to return all but a very few. And how do I do this? Because most people don’t lock their phones!!! This means I can pick up the phone and got through their contact lists and look for “Mom.” In other cases I just wait for someone to call it and say “Hello I found this phone how can I help you?”

There are some things you can do so you don’t have that freak-out moment.

Password protect your device—This is the simplest thing you can do to protect the information stored on your device. Not only does it keep strangers from accessing your data, but it may also discourage thieves from taking the device in the first place.

Regularly backup your data—Don’t be part of the 32% that only does backups once a year! Back up your data at least once a week, so you have electronic copies of all of your valuable information. This way, even if you lose your device, you won’t lose all of your data.

Don’t store your logins—Rather than having your apps and mobile browser remember your login information, type in your login credentials each time (especially for banking). This way, if a stranger accesses your device they cannot log into your accounts as you. Or better yet, don’t store sensitive data on your phone.

“Mark” your device—To mark your device, take a screenshot of your emergency contact numbers and use it as your phone’s lock screen. If someone finds your device, it will be easy for him or her to return it to you.

Write down the serial number—Record your phone’s serial number and store it somewhere other than on your device. If you lose your phone and it eventually turns up, you will be able to identify it.

Install mobile security—Software like McAfee® Mobile Security, which includes antivirus protection, app protection, backup and restore functions, and remote wipe and tracking in the case of loss or theft

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  (Disclosures)

US Teens Are Up to No Good Online Compared to European Teens – McAfee Study Reveals

Teens are spending more and more time online these days and while the Internet offers a variety of benefits it can also serve as a dangerous space –and not just in America. According to McAfee’s Exploring the Digital Divide study that examines teen online behavior, teens oversees and in the US are continually finding ways to hide their online activity from their parents and are vulnerable to committing such acts as cheating and cyber bullying.

Specifically, the study has uncovered that US teens access inappropriate content online, cheat using their mobile devices, and know how to hide what they do from their parents online more than teens do in European countries including the UK, Spain, the Netherlands, Italy, Germany, and France.

Key Findings from the Study include:

Nude Images and Pornography:

32% of US teens admit to intentionally searching for nude images or pornography online when asked.

25% of UK teens, 29.5% of Spanish teens, 24.5% of Dutch teens, 23.5% of Italian teens, 27% of German teens and 11.5% of French teens confess that they actively seek out sexual content online.

Cheating on Mobile Devices:

16% of US teens admitted to cheating on a test using a mobile phone when asked.

3% of UK teens, 9.5% of Spanish and Dutch teens, 13% of Italian teens, 14.5% of German teens and 3.5% of French teens have also admitted to cheating using their mobile devices.

Knowing How to Hide Online Activity from their Parents:

33% of US teens strongly agree that they know how to hide their online activity from their parents.

27% of UK teens, 28.5% of Spanish teens, 24% of Dutch and Italian teens, 28.5% of German teens, and 21% of French teens also strongly agree that they are confident in hiding their online behavior from their parents.

Cyber Bullying:

Cyber bullying is more consistent both oversees and in the US.

Teens that have bulliedonline:

US: 9%

UK: 4.5%

Spain: 2.5%

Netherlands: 9.5%

Italy: 9%

Germany: 6%

France: 4%

Teens that witnessed cruel behavior online and joined in on the mean behavior:

US: 6%

UK: 10%

Spain: 3.8%

Netherlands: 7.4%

Italy: 3.4%

Germany: 6%

France: 2.3%

Much of this should come as no surprise, but some of it is alarming. Parents, you must stay in-the-know. Since your teens have grown up in an online world, they may be more online savvy than their parents, but you can’t give up. You must challenge yourselves to become familiar with the complexities of the teen online universe and stay educated on the various devices your teens are using to go online.

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  (Disclosures)

10 Tips to Safe Online Shopping

How times have changed. I can remember when Christmas didn’t start until after Thanksgiving—not before Halloween as we see things in stores and online now. Seems like the holiday season and decorations start earlier and earlier every year.

But one thing that hasn’t changed is that Black Friday is still a big shopping day. And with the advent of online shopping has emerged Cyber Monday (the first Monday after Thanksgiving) which is another big sale day for online shoppers. In fact, a recent McAfee study revealed that 70% of American’s plan to shop online this holiday season. And nearly half (48%) of us will be shopping online on Cyber Monday.

Although many of us may take advantage of these great deals that the holidays offer, we also need to be aware of the risks. Online shopping is a fun and convenient way to make purchases, locate hard-to-find items, and discover bargains, but we need to take steps to protect ourselves.

To stay safe this holiday season while shopping online:

Check the site’s web address—Once you arrive at a site, you need to make sure that it is legitimate and not a fake site. So check the URL and make sure you really are at www.amazon.com and not www.amazan.com even though they make look alike.

Check that the site is secure—The McAfee survey revealed that 20% of Americans cannot ever tell if a site is secure. Some things to look for on a secure site include:

Check to make sure that the web address starts with https instead of http, which indicates that encryption is being to protect your information.

Look for lock symbol on the page which is another indication that the site is using encryption.

Look for a security seal, such as the McAfee SECURE™ trustmark, indicating that the site has been scanned and verified as secure by a trusted third party. This security seal indicates that the site will help protect you from identity theft, credit card fraud, spam, and other malicious threats..

Pay with a credit card—Credit cards on the whole offer better protection against fraud than debit cards. You won’t be liable for fraudulent purchases and the thieves won’t be able to drain your bank account if they get your account #. Most banks now offer virtual or one time use credit cards numbers. You can go to your bank’s online site and enter your credit card number and it will give you a number that you can use for a specific purchase. Any use of that one-time credit card number will be automatically flagged or not approved by your bank.

Do not use a public computer or free wireless connection to shop online—If you are using a public computer, strangers may be able to access your browsing history and even your login information. To protect yourself, do all of your online shopping from your home computer or your personal mobile device. Never shop using an unsecured wireless connection (like those free Wi-Fi hotspots at coffee shops) because hackers can access your information.

Make sure you have a clean computer or mobile device—Make sure you have up-to-date security software on all your devices, like McAfee All Access, that can safeguard your privacy, protect against identity theft, and defend against viruses and online threats.

Keep a paper trail—Keep a copy of your order number and receipt, and note which credit card you used. When you receive your credit card statement, review it to make sure that the charge placed on your card is correct and that there are no extra fees or charges.

 

By following some of these simple tips, you can enjoy all the advantages that online shopping has to offer and prevent risking your personal information.

 

I hope you have a safe, enjoyable holiday shopping season.

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  (Disclosures)

Internet Security Isn’t Getting Any Prettier

Malicious software (malware) is, in many ways, very well understood. Security experts know how it works and why. Cybercriminals’ motivations are pretty straightforward—making money from malware and related attacks.

In the latest McAfee Threats Report: Q3 2012 , malware is still growing and while it’s not growing quite as fast as it was in previous quarters, the amount of malware still topped 100 million samples.

Besides the large growth in mobile malware , there has also been an increase in the tactics that cybercriminals are using to attack you. Some of these techniques include:

Autorun Malware
AutoRun (also known as AutoPlay) is a feature in Windows systems that dictates what action the system should take when a device is connected to your PC. So when you connect your USB drive or insert a DVD into your drive, AutoRun is what will automatically open or in some cases play what is on these devices. Cybercriminals use this feature to automatically install malicious software when an infected USB or other removable device is plugged into your PC. What makes AutoRun scary is it requires no effort on your part to click any links. This is a “plug and play” malware and can even come on products shipped right from the factory such as external hard drives, USB drives and LCD picture frames.

Mac malware
With over 350 new samples in Mac malware in Q3 2012, the growing popularity of Apple products has inspired cybercriminals to create malware that will harm Macs. McAfee Labs is seeing fake antivirus programs targeted at Mac users. In other words, there are an increased number of programs known as “scareware,” which claim to protect users from viruses and malware but users who attempt to install the supposed antivirus software are actually downloading malicious software. This malware can damage your Mac or compromise your personal information.

Ransomware
Ransomware malware typically accuses you of visiting illegal websites, locks your computer then demands a payment to unlock the device. And even if you pay, you are not guaranteed to get access to your files and now the criminal has your financial information.You can get “infected” with ransomware in a myriad of ways, including links in emails, instant messaging, texts and social networking sites, or by simply visiting a website that can download the malicious software on your computer. With a 43% growth this past quarter, ransomware is definitely something to watch out for.

The past quarter’s threats report has shown cybercrime exhibits few signs of slowing down, and cybercriminals using more tricks to steal your money. To help protect yourself you should:

Keep your operating systems updated on all your devices

Be selective about websites you visit and use a safe search tool like McAfee SiteAdvisor® to warn you about risky sites before you click

Avoid clicking links in emails, text messages or instant messages, especially from people you don’t know

Stay educated on the latest tricks, cons and scams designed to fool you

Use comprehensive security software like McAfee All Access that provides cross-device protection for all your PCs, Macs, smartphones and tablets

 

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  (Disclosures)

Mobile Malware is Here: Beware!

iPhones, Androids and other smartphones are much more than just a way to call our friends and family and store their phone numbers. Today’s smartphones have become our most personal computer and contain much more than pictures and contacts. They now allow us to access financial data, bank accounts, and medical information from anywhere at any time. And for many people, their mobile device has or is replacing their PC.

With all this convenience and access, comes some risk. Criminal hackers see this as an opportunity for them to access your information and make money. And so as the number of mobile devices has grown, McAfee has seen the amount of mobile malware grow.

The Android platform remains the largest target for both mobile malware and spyware. In fact, we see very few mobile threats that are not directed at Android phones. After a slight decline earlier in the year, Android malware has rebounded and almost doubled this quarter with over 20,000 samples.

The infographic below illustrates some of the ways that cybercriminals use to “infiltrate” your mobile device.

What most of these attacks have in common is that they allow a cybercriminal to take over your mobile device in some way. This is why it is critical to protect your mobile device.

Only buy apps from a well-known reputable app store, such as Google Play

Keep your operating system software updated

Be selective about websites you visit

Avoid clicking links in text messages or emails, especially if they are from people you don’t know

Stay educated on the latest tricks, cons and scams

Use comprehensive mobile security, like McAfee Mobile Security that includes antivirus, anti-theft, and web and app protection or comprehensive device protection like McAfee All Access that protects all your devices including your mobile devices

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  (Disclosures)

Cyber-Scrooges Set in Motion the 12 Scams of Holidays

The holidays are supposed to be a fun-filled time for celebrating with family and friends, but cybercriminals see this as a time of opportunity. They look to take advantage of us during this time when we’re in the spirit of giving and when we’re scrambling to get our gifts purchased, trees trimmed and donations made.

In a recent study, McAfee found that 70% of Americans plan to shop online during the holiday season and that 24% of us will be doing that shopping via our mobile devices. The scary part is that 88% of us would be willing to trade personal information in order to receive a great offer—something that could cause us to fall into scammers’ traps.

Here are the “12 Scams of the Holidays,” the dozen most dangerous online scams to watch out for this holiday season, revealed today by McAfee.

To make sure your holidays are not stolen by the Grinch, here are some tips on how to protect yourself against scams during the holidays, and year-round:

Stay suspicious—Like mom said, be wary of any offer that sounds too good to be true.

Practice safe surfing—When searching for holiday gifts, use a safe search plug-in such as McAfee SiteAdvisor®.

Practice safe shopping—Make sure you stick to reputable e-commerce sites that have been verified as safe by a trusted third-party, like the McAfee SECURE™ mark. Also look for “https” at the beginning of a site’s web address, which indicates that the site is secured.

Use strong passwords— Make sure your passwords are at least eight characters long and contain a variety of upper and lower case letters, numbers and symbols.

Be careful when clicking—Don’t click on links in messages from people you don’t know, and use a URL expander to know what site you are going to before clicking on a shortened URL.

Use comprehensive computer security—Make sure you have up-to-date security software that includes antivirus, anti-spyware, anti-spam, and anti-phishing protection for all your devices, including your mobile phone and tablet.

Educate yourself—Keep up-to-date on the latest scams and tricks cybercriminals use, so you can learn to recognize scams and avoid potential attacks.

Robert Siciliano is an Online Security Expert for McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  Disclosures.

Laptop Theft is a Serious Problem

Almost all of us know someone who has lost or had their mobile device stolen. Thieves are becoming more sophisticated every day. They are after your personal information.

But what about losing your laptop computer?  Petty thieves used to steal a laptop for its quick resale value. But as laptop prices have come down and their computing power goes up, it is the data contained on them where the money is for a criminal.

With readily available IT tools, they can access your hard disk and extract all your personal information. The results can be much more serious than leaving your wallet or purse at the coffee shop. According to the FBI, a laptop is stolen every 53 seconds and 97% of stolen laptops never recovered, so it’s more important than ever for all of us to protect our digital assets.

McAfee is helping protect you with the new release of McAfee Anti-Theft, security software designed for Ultrabooks to protect your property and personal information. This latest product is a collaborative effort with Intel that leverages Intel Anti-Theft Technology to provide device and data protection for consumers in today’s connected world.

This smart security tool combines hardware with software to detect potential theft, help you track your lost or stolen Ultrabook, and lock it down remotely so your personal files stay that way. Once your PC is returned, getting back to normal is as easy as typing in your personal password. And with the provided Intel Anti-Theft stickers, thieves may think twice about stealing a laptop that’s so well protected.

McAfee Anti-Theft is available on Ultrabook devices. It’s just one more way McAfee helps you keep your personal information protected for a more worry-free digital life.

Robert Siciliano is an Online Security Evangelist to McAfee. Watch him discussing information he found on used electronic devices YouTube. (Disclosures)