Featured Blogs
McAfee Launches First Cyber Defense Center in the Middle East
I hope you enjoyed a great summer vacation with your families and loved ones. Personally I had a wonderful and...
Where, oh Where, Does That QR Code Lead?
What is square, flat, and black and white all over? If you answered “a QR Code”, you’re correct. One of...
Cidox Trojan Spoofs HTTP Host Header to Avoid Detection
Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP...
1-2-3: How to take a screen shot on your computer or mobile phone
There are some simple moves online that can save you an enormous amount of time. And when it comes to...
Mobile Bankers Beware: A New Phishing Scam Wants Your Money
As a growing number of smartphone owners get increasingly comfortable using their mobile devices for everything from shopping online to...
Bitcoin Headlines Attract Malware Developers
Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate. In the second quarter of...
Don’t Take a Bite out of that Apple Gift Card Scam
Good rule of thumb on the web: When it seems too good to be true, it probably is. Those ads...
BYOD: Balancing Convenience and Security
It lies next to you as you sleep, comes with you to work, rides home with you in your car...
What Are the Risks of Geo-Location?
Using your mobile’s built-in global positioning system (GPS) functionality allows location-based services (or geo-location) to locate and publish information about...
Spy? Where? Mobile Spyware Hiding Right Under Your Nose
Some days it feels like the whole world is going mobile. We tweet, we text, we browse the world from...