Articles by Author
Privacy & Identity Protection
How Hackers Use Popular Shows to Infect Your Devices
If there’s one reasonable measurement of how popular a television series has become, it’s how often it’s...Jan 02, 2015 | 4 MIN READ
McAfee News
2014: Security Year in Review
From the Heartbleed bug to large-scale (and highly publicized) data breaches, Shellshock to mobile threats—2014 did not...Dec 29, 2014 | 3 MIN READ
McAfee Labs
Slow File Infector Spies on Victims
Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware...Dec 22, 2014 | 4 MIN READ
Internet Security
What is Ransomware?
Imagine that you want to pull up a certain file on your computer. You click on the...Dec 22, 2014 | 3 MIN READ
McAfee Labs
InstallCube: How Russian Programmers Turn Adware Into Cash
We often observe applications bundled with ad-displaying programs to generate revenue for those products. These are not...Dec 16, 2014 | 5 MIN READ
Mobile Security
WhatsApp with End-to-End Encryption?
Throughout the past year, many mobile messaging apps have come under fire for inherent security vulnerabilities. This...Dec 16, 2014 | 3 MIN READ
Privacy & Identity Protection
Should You Use Near-Field Communications?
Have you ever wondered what kind of superpower you’d have? I’ve always wanted to send messages and...Dec 15, 2014 | 3 MIN READ
Executive Perspectives
How to ‘speak security’ to the board
There has been an age-old debate about the gap between ‘the business’ and ‘IT’. And nowhere is...Dec 10, 2014 | 4 MIN READ
Privacy & Identity Protection
Doxxing, The Internet and How You Can Lock Down Your Data
There exists, in this world of ours, a term describing the public release of a person’s identity...Dec 09, 2014 | 4 MIN READ
Privacy & Identity Protection
What is Pharming?
. For a lot of kids today, mash-ups are all the rage—whether it’s combining two videos, two...Dec 08, 2014 | 2 MIN READ
Privacy & Identity Protection
Youth & Social Media
The digital world is here to stay. The youth are growing up with and making internet technologies,...Dec 03, 2014 | 3 MIN READ
Executive Perspectives
Three Pillars for A Stronger Content Strategy
The content marketing trend is in full swing. Now, the question is not whether to create your...Nov 18, 2014 | 3 MIN READ