Articles by Author
Family Safety
McAfee’s New Digital Safety Program at the 2014 CED Fall Policy Conferencece
This week I had the privilege of visiting Washington, D.C., to attend the Committee for Economic Development...Nov 14, 2014 | 3 MIN READ
Executive Perspectives
White Networks
Internet of Things (IoT) needs “white networks” to scale and deliver the assurance we require for machine-things;...Nov 14, 2014 | 4 MIN READ
McAfee Labs
Exploit Kits Improve Evasion Techniques
Exploit kits are toolkits that malicious developers use to take advantage of client-side vulnerabilities, targeting web browsers...Nov 12, 2014 | 2 MIN READ
Mobile Security
App Inventor Enables the Easy Creation of Malicious Apps
In today’s increasingly connected society, heaps of new mobile apps are cropping up every day. It no...Nov 04, 2014 | 3 MIN READ
Privacy & Identity Protection
What Is a Trojan Horse?
One of history’s great literary classics is Homer’s Iliad, which tells the story of the Trojan horse—the...Oct 27, 2014 | 3 MIN READ
Privacy & Identity Protection
What is Criminal Identity Theft?
Identity theft gets all kinds of buzz in the news. It’s not hard to see why—in 2012,...Oct 20, 2014 | 3 MIN READ
Privacy & Identity Protection
Android’s CyanogenMod Vulnerable to Zero-Day Threat
Have you installed CyanogenMod on your Android device? If yes, you’re likely vulnerable to a newly discovered...Oct 17, 2014 | 3 MIN READ
Privacy & Identity Protection
Banks are Using Biometric Measures to Protect Against Fraud
When thinking about biometric security, one might picture Mission Impossible-like retinal scanning or fingerprint reading technology a...Oct 15, 2014 | 3 MIN READ
Internet Security
Emma Watson Video Scam: Hackers Use Celeb’s Popularity to Unleash Viruses
Following the announcement of the 2014 Most Dangerous Celebrities™ earlier this month, our senses have been heightened...Oct 13, 2014 | 4 MIN READ
Privacy & Identity Protection
What is Browser Hijacking?
Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed or...Oct 13, 2014 | 2 MIN READ
Privacy & Identity Protection
The Hacker’s New Best Friend Could be Your USB Port
It’s tiny and portable, yet perfect for storing large items. I’m talking about the good ol’ Universal...Oct 06, 2014 | 4 MIN READ
Privacy & Identity Protection
What’s Your Click IQ?
The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be...Oct 06, 2014 | 2 MIN READ