recommended reading

John McAfee can't stay out of the spotlight

Software company founder John McAfee

Software company founder John McAfee // Guatemala's Human Rights Ombudsman's office/AP

The John McAfee saga was intriguing at first and then exciting when everything got all action-packed. But as McAfee sits in a Guatemalan detention center awaiting his fate, things seem a little sad. It's not necessarily the situation that's sad. McAfee fled Belize so that he wouldn't have to face questioning from police, broke the law when crossing into Guatemala, got caught and now finds himself in an empty room with a couple of laptops and a lot of free time. What's someone who's been basking in the glow of the media spotlight for nearly a month do when he's all alone? He creates his own media spotlight and continues to bask.

At primetime on Sunday night, McAfee posted the first of what we're sure will be many livestreamed speeches followed by a Q&A. It looks like a YouTube confessional, probably because it basically is. About 20 minutes of the total footage is made up of McAfee answering some questions from fans after giving a brief statement that basically amounts to him telling viewers to go read his blog and "the truth." He's pointing specifically to a very strange series of six posts posted by posted by "Harold M. A close friend of Mr McAfee" described as "the archived writing and evidence that Mr McAfee has instructed be released in the event he does not communicate with us in 24 hours." During the other 20 minutes of footage, McAfee appears to have forgotten to turn the camera off, and so we get to watching him pace around the room, read the Internet and smoke cigarettes.

Read the entire story at Atlantic Wire.

Threatwatch Alert

Credential-stealing malware / User accounts compromised / Software vulnerability

Android Malware Infects More than 1M Phones, Adds 13,000 Devices a Day

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.