Articles by Author
Privacy & Identity Protection
Beware of the Risks of Online Gaming and Fantasy Football
August may mean the last days of summer vacation and start of back to school for some,...Aug 13, 2014 | 4 MIN READ
Security News
Russian Hackers Steal 1.2 Billion Passwords
On Tuesday afternoon, The New York Times revealed that a group of Russian hackers now holds 1.2...Aug 06, 2014 | 5 MIN READ
McAfee Labs
Yahoo Ads Serve Mobile Fake Alerts
“Android Armour,” a malicious knockoff of Armor For Android, has been circulating for some time with no end...Aug 06, 2014 | 3 MIN READ
McAfee Labs
Trailing the Trojan njRAT
One Trojan that just won’t go away is the remote access tool njRAT. Microsoft recently took down...Aug 05, 2014 | 5 MIN READ
Mobile Security
Chinese Worm Infects Thousands of Android Phones
Last weekend, it was reported in China that an SMS worm was wildly spreading among Android mobile...Aug 05, 2014 | 3 MIN READ
Family Safety
The Golden Rule Of The Internet- Tips To Help You Train Your Kids To Become Good Netizens
There are rules and then there are rules for kids. A set of rules for school, another...Jul 29, 2014 | 5 MIN READ
McAfee Labs
Malicious Utility Can Defeat Windows PatchGuard
In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware...Jul 29, 2014 | 3 MIN READ
Mobile Security
More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked
In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else....Jul 25, 2014 | 3 MIN READ
Executive Perspectives
Results- vs. Device-Centric Threats: Why Cyber-Attacks Should be in the WMD Conversation
Why Cyber-Attacks Should be in the WMD ConversationJul 23, 2014 | 4 MIN READ
Mobile Security
Is Disckreet App Really That Discreet?
Love is a powerful feeling that can cause an individual to do things they wouldn’t normally do—sometimes...Jul 22, 2014 | 3 MIN READ
Privacy & Identity Protection
Google’s Project Zero: Good News for Cyber Security
Google has assembled a team of counter-hackers to search, identify and patch zero day vulnerabilities and malware...Jul 18, 2014 | 3 MIN READ
Security News
The Surprisingly Simple Google Maps Attack That Shut Down a Business
Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need...Jul 14, 2014 | 4 MIN READ