Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Intel To Buy Out McAfee For $7.68 Billion

The acquisition would allow Intel to offer a wide range of tightly bundled hardware and software security solutions.

Intel shook up the security landscape Thursday, announcing that it has agreed to acquire antivirus software maker McAfee for $48 per share, or $7.68 billion. The deal, if it passes regulatory muster, would enable the chipmaker to offer tightly integrated hardware and software security solutions for PCs, servers, and mobile devices.

Intel said it plans to operate McAfee as wholly-owned subsidiary within its Software and Services group. Company officials said the increase in threats that target online computing is a major reason behind the acquisition.

"With the rapid expansion of growth across a vast array of Internet-connected devices, more and more of the elements of our lives have moved online," said Intel CEO Paul Otellini, in a statement.

"In the past, energy-efficient performance and connectivity have defined computing requirements. Looking forward, security will join those as a third pillar of what people demand from all computing experiences," said Otellini.

The deal is sure to alter the competitive picture in the security industry, as it puts Intel into competition with Symantec and Microsoft—two vendors with which the chipmaker has previously partnered.

But Intel officials said they've come to believe that security software needs to be tightly coupled with processors for it to be truly effective against a growing range of viruses, malware, and spyware. "Hardware-enhanced security will lead to breakthroughs in effectively countering the increasingly sophisticated threats of today and tomorrow," said Renee James, senior VP of Intel Software and Services, in a statement.

Those threats, while harmful to computer users, have helped McAfee increase its top and bottom lines in recent quarters as consumer and business spending on security software has grown in the face of mounting concerns over identity theft, piracy, and other types of cyberattacks. McAfee posted double-digit growth last year on margins of almost 80%.

McAfee executives said operating under Intel would allow their organization to offer more solutions for a broader array of platforms. "We believe this acquisition will result in our ability to deliver a safer, more secure and trusted Internet-enabled device experience," said McAfee CEO Dave DeWalt, in a statement.

Intel said it expects to take a slight hit to earnings in the first year of the deal. Shares of the company were were down 2.6%, to $19.08, in early trading Thursday. McAfee shares jumped 57%, to $47.21, on news of the deal. Symantec shares were up 6.75%, to $13.44, as investors speculated it may be the next security software vendor in line for a buyout.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cybersecurity Team Holiday Guide: 2019 Gag Gift Edition
Ericka Chickowski, Contributing Writer,  12/2/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19647
PUBLISHED: 2019-12-09
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input.
CVE-2019-19648
PUBLISHED: 2019-12-09
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution.
CVE-2019-19642
PUBLISHED: 2019-12-08
On SuperMicro X8STi-F motherboards with IPMI firmware 2.06 and BIOS 02.68, the Virtual Media feature allows OS Command Injection by authenticated attackers who can send HTTP requests to the IPMI IP address. This requires a POST to /rpc/setvmdrive.asp with shell metacharacters in ShareHost or ShareNa...
CVE-2019-19637
PUBLISHED: 2019-12-08
An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_decode_raw_impl at fromsixel.c.
CVE-2019-19638
PUBLISHED: 2019-12-08
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function load_pnm at frompnm.c, due to an integer overflow.