Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Intel To Buy Out McAfee For $7.68 Billion

The acquisition would allow Intel to offer a wide range of tightly bundled hardware and software security solutions.

Intel shook up the security landscape Thursday, announcing that it has agreed to acquire antivirus software maker McAfee for $48 per share, or $7.68 billion. The deal, if it passes regulatory muster, would enable the chipmaker to offer tightly integrated hardware and software security solutions for PCs, servers, and mobile devices.

Intel said it plans to operate McAfee as wholly-owned subsidiary within its Software and Services group. Company officials said the increase in threats that target online computing is a major reason behind the acquisition.

"With the rapid expansion of growth across a vast array of Internet-connected devices, more and more of the elements of our lives have moved online," said Intel CEO Paul Otellini, in a statement.

"In the past, energy-efficient performance and connectivity have defined computing requirements. Looking forward, security will join those as a third pillar of what people demand from all computing experiences," said Otellini.

The deal is sure to alter the competitive picture in the security industry, as it puts Intel into competition with Symantec and Microsoft—two vendors with which the chipmaker has previously partnered.

But Intel officials said they've come to believe that security software needs to be tightly coupled with processors for it to be truly effective against a growing range of viruses, malware, and spyware. "Hardware-enhanced security will lead to breakthroughs in effectively countering the increasingly sophisticated threats of today and tomorrow," said Renee James, senior VP of Intel Software and Services, in a statement.

Those threats, while harmful to computer users, have helped McAfee increase its top and bottom lines in recent quarters as consumer and business spending on security software has grown in the face of mounting concerns over identity theft, piracy, and other types of cyberattacks. McAfee posted double-digit growth last year on margins of almost 80%.

McAfee executives said operating under Intel would allow their organization to offer more solutions for a broader array of platforms. "We believe this acquisition will result in our ability to deliver a safer, more secure and trusted Internet-enabled device experience," said McAfee CEO Dave DeWalt, in a statement.

Intel said it expects to take a slight hit to earnings in the first year of the deal. Shares of the company were were down 2.6%, to $19.08, in early trading Thursday. McAfee shares jumped 57%, to $47.21, on news of the deal. Symantec shares were up 6.75%, to $13.44, as investors speculated it may be the next security software vendor in line for a buyout.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13864
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
CVE-2020-13865
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
CVE-2020-11696
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
CVE-2020-11697
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
CVE-2020-13646
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.