Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Why John McAfee Is Paranoid About Mobile
Oldest First  |  Newest First  |  Threaded View
Page 1 / 2   >   >>
User Rank: Apprentice
8/19/2014 | 2:11:19 PM
The very first article you write is about John McAfee which really isn't about McAfee?

The man peddles apps for smart phones and then says dump your smart phone. His solution is not a solution is it? He reminds me of the saying, "If you can't dazzle them with your brilliance then baffle them with Bullsh!t".

Your article was long winded and not on point and failed to become relevant.
Thomas Claburn
Thomas Claburn,
User Rank: Ninja
8/19/2014 | 6:27:28 PM
Re: Interesting
Why is John McAfee paranoid about mobile? Because men in the dark glasses are watching.
User Rank: Author
8/19/2014 | 6:36:01 PM
Re: Interesting
Interesting criticism, John Mcafee has built a billion dollar security giant in his lifetime, is asked to speak all over the world (accept Belize) and consults some of the world's largest companies.  Also, since your interested in my career--I've also been featured on Wired and contributed to another article released on Tech News World today...so actually this isn't my first article.  Thank you for reading!

User Rank: Apprentice
8/19/2014 | 6:55:06 PM
email has flags
Phishing and malware emails have flags if you know how to look for them. Sometimes there is a word in another color for no reason. Sometimes a word is capped unnecessarily. Sometimes the address says Dear [Name]; (colon is inappropriate).
User Rank: Apprentice
8/19/2014 | 7:40:20 PM
Re: Interesting
@RiskIQBlogger,McAfee rehearses a few lines of BS and repeats it ad infinitum. Look at his recent interviews on Fox and Bloomberg West, exact same blah blah blah followed by completely irrelevant. He is no more than an advertisement for Smart Phone apps he is offering while in the same breath he tells you to quit using smart phones. He has become so confused by his own contradictions that he is contradicting himself. You mention he was a Genius for building McAfee Antivirus and cashing out in 1994 for 100 million bucks. On the flip side a foole and his money soon be at debate. He lost every dime he had in less than 20 years - That's not genius, smart or wise. That's plain stupidity. You using his name to promote your article doesn't make you look any smarter.


@Thomas Claburn, Emptor Cavete
User Rank: Apprentice
8/20/2014 | 10:18:17 AM
Re: Interesting
There is huge value in what McAfee is doing, just because he does not conform to what we believe are societies 'standard' or 'code of ethics' you can't dis-credit his achievments. McAfee Associates paved the path for modern anti-virus detection that put it in the hands of every computer user.

We rely on people like McAfee to distrust the process and create solutions to open our eyes to the next threat. His message is beware of the unknown!, understand the reach of your smart phones and the infancy of its use. We access more private info on our smart phones than we do on our computers yet how many have anti-virus applications installed - we all have it on our computers but why not on our smart phones. Its simply because we are blind to its dangers.

McAfee is just taking a stand and saying 'open your eyes'. We access email, banks, paypal, and much more from these small devices with little thought to their security.

Bravo to the author and thanks John - keep the message strong - education is the key to threat mitigation.
User Rank: Apprentice
8/20/2014 | 10:47:51 AM
Re: Interesting

There is zero value in what McAfee and his gaggle of retards has to say. McAfee just lost a lawsuit for 2.5 million a month ago for the death of 2 men. Deaths that he was clearly responsible for. The very same suit he ran to Belize to avoid.

He is on the run from a second suit for the murder of Greg Faull - a lawsuit he refuses to be served a summons for (Even after saying he would face it). He is running from the suit because he knows he will lose and will be promptly extradited back to Belize. He was having sex with children, was making his own dope and did kill Greg Faull. None of this is a joke nor will it be forgotten.

All the uninformed mindless drones keep repeating that John McAfee made the McAfee brand what it is and it's an uneducated lie. McAfee was forced out of his own company in 1992 by Bill Larson because John Was always stoned off his butt and could not function. Bill Larson made McAfee what it is- he secured the product lines and did all the work and John McAfee was nothing more than a bad joke.

John has been stuck on stupid for many, many years.

John has made mention many times that he has 17,000 hours of recordings and data recorded that was stolen from Belize officials after he gave them all malware infused laptops.

On August 11, 2014 he gave interviews to both Fox News and Bloomberg West and clearly stated he would disclose "The whole ball of wax" on Monday August 18, 2014. He said he would be posting it all on his website brownlist. He lied AGAIN.

User Rank: Apprentice
8/20/2014 | 11:06:12 AM
Re: Interesting
His lawsuits have nothing to do with the value i talk of. No doubt he made some wrong turns - so did Bill Clinton. The US lawsuit by the way was for negligence after Greg died sporting on John's propelled hang glider - a simple wiaver form would have avoided that mess.

Mens Warhouse fired George Zimmer, Apple fired Steve Jobs -- so what it happens! But no one ever can deny that it was their vision, passion and insight that birthed the organizatiions to where they are now.

You're mixing your arguments up here. This article is not about his personal life and decisions. its about his insight, knowledge and experience within the realm of security.

You have to make that separation. Half of your favorite musicians and actors you adore likley have similar lives - stoned out and on the wrong side of the law. Does that make you appreciate their talent any less. 

My only context to McAfee and I believe the authors direction here is security education - NOT social ethics.

User Rank: Apprentice
8/21/2014 | 9:00:08 AM
He is not that crazy
This is a great article by Peter! John, apprently isn't as crazy as people thought he was. His points make quite a bit of sense and it is hard not to see validity in them. Mobile is the single most enabler these for most orgnazations. It is also the single biggest risk. It's true it is getting harder to attack mobile devices in some ways because the code footprint is smaller (techically making it tighter) as well more people are concentrating their efforts on the PC. I do think we will see a radical shift as more attacker focus on mobile platforms just based on their popularity.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
8/21/2014 | 10:19:45 AM
Re: He is not that crazy
There is a legitimate debate about how crazy or not crazy John McAfee is. But it's hard to argue against the fact that mobile is a substantial security risk. 
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...