European regulators are looking closely at Intel's planned McAfee acquisition and may hold up the deal with an investigation, according to a report published Friday. European regulators are looking closely at Intel’s planned McAfee acquisition and may hold up the deal with an investigation, according to a report published Friday.The European Union is concerned about Intel’s plans to embed security features directly into its microprocessors, The Wall Street Journal reported, citing unnamed sources.Intel supplies the bulk of the world’s PC chips, and the EU is concerned that if McAfee has “privileged access” to the security features it could put other security vendors at an unfair disadvantage, the Journal said.The EU’s antitrust regulator has “privately expressed concerns” about the deal during its preliminary review and could decide to subject it to a more in-depth examination, the Journal said. Intel spokesman Chuck Mulloy declined to comment beyond saying that Intel is “continuing to work with regulators as they conduct their reviews.” A McAfee spokesman pointed to an update on the merger status McAfee posted to its website Thursday, which makes no reference to any concerns at the EU. “We are happy to announce that all required pre-close regulatory filings around the world have been made and the matter is now under review in those respective jurisdictions,” the statement says. “We expect that the deal will close some time in the first half of 2011 but do not have any further details to share at this time.”An in-depth merger review can hold up a big acquisition by several months. The EU had competitive concerns about Oracle’s acquisition of Sun, and Oracle had to wait four months after the EU began its investigation to close the deal.When Intel announced the US$7.7 billion acquisition, it said it expected to close the deal in the first quarter of next year, or even by the end of 2010, the Journal noted. A statement on Intel’s website says it now hopes to close the deal in the first half of 2011, the Journal reported. Related content news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe