The latest upgrade to McAfee’s VirusScan Enterprise security software is causing hiccups for some versions of IBM’s Lotus Notes, the companies warned.The problem affects users who have upgraded to VirusScan Enterprise 8.5i and are using the R6 or R7 version of Lotus Notes, McAfee said.While working in Lotus Notes e-mail for a period of time, typically an hour or two, the program will display the following error message when users try to open or delete e-mail: “You are not authorized to perform that operation.” Users can close the dialog box but then can’t do anything else in Notes.Notes can be restarted, but the error appears again after another hour or two, IBM said in an advisory. To avoid the problem, the companies recommended disabling two settings in McAfee’s software: “scan all server databases” and “scan server mailboxes.” McAfee posted instructions on how to disable the settings in its advisory. Affected users should contact McAfee technical support. IBM said another option is to disable VirusScan Enterprise completely, although clearly that may have security consequences. -Jeremy Kirk, IDG News Service Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe