McAfee

Blog Archives

LinkedIN Twitter
We're here to make life online safe and enjoyable for everyone.

Articles by Author

Privacy & Identity Protection
Beware of the Risks of Online Gaming and Fantasy Football
August may mean the last days of summer vacation and start of back to school for some,...
Security News
Russian Hackers Steal 1.2 Billion Passwords
On Tuesday afternoon, The New York Times revealed that a group of Russian hackers now holds 1.2...
McAfee Labs
Yahoo Ads Serve Mobile Fake Alerts
“Android Armour,” a malicious knockoff of Armor For Android, has been circulating for some time with no end...
McAfee Labs
Trailing the Trojan njRAT
One Trojan that just won’t go away is the remote access tool njRAT. Microsoft recently took down...
Mobile Security
Chinese Worm Infects Thousands of Android Phones
Last weekend, it was reported in China that an SMS worm was wildly spreading among Android mobile...
Family Safety
The Golden Rule Of The Internet- Tips To Help You Train Your Kids To Become Good Netizens
There are rules and then there are rules for kids. A set of rules for school, another...
McAfee Labs
Malicious Utility Can Defeat Windows PatchGuard
In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware...
Mobile Security
More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked
In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else....
Executive Perspectives
Results- vs. Device-Centric Threats: Why Cyber-Attacks Should be in the WMD Conversation
Why Cyber-Attacks Should be in the WMD Conversation
Mobile Security
Is Disckreet App Really That Discreet?
Love is a powerful feeling that can cause an individual to do things they wouldn’t normally do—sometimes...
Privacy & Identity Protection
Google’s Project Zero: Good News for Cyber Security
Google has assembled a team of counter-hackers to search, identify and patch zero day vulnerabilities and malware...
Security News
The Surprisingly Simple Google Maps Attack That Shut Down a Business
Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need...
1249 - 1260 of 1504

Stay Updated

Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats.

FacebookTwitterInstagramLinkedINYouTubeRSS
Back to top