Articles by Author
McAfee Labs
Cybercrime ‘Highlights’ of First Quarter 2014
As a supplement to the next McAfee Labs Threats Report, which will appear next month, we offer...Apr 30, 2014 | 5 MIN READ
Internet Security
You’ve Got Mail — But it Might be a ‘Spoof’
As Internet users everywhere are on heightened alert following the discovery of the password-compromising Heartbleed bug earlier...Apr 24, 2014 | 5 MIN READ
Internet Security
How Online Casinos Help Hackers Keep Illegal Loot
In Martin Scorsese’s 1995 film, “Casino,” Robert DeNiro’s character is charged with operating a 1970’s Las Vegas...Apr 24, 2014 | 4 MIN READ
Internet Security
Tinder Not So Tender
Tinder is a kind of modern day ‘Hot or Not’ mobile dating app. It finds matches based...Apr 22, 2014 | 4 MIN READ
Mobile Security
What Mobile Users Should Know About Heartbleed: Free McAfee Android App
By now, you have probably heard about the Heartbleed bug, estimated to affect up to two-thirds of...Apr 21, 2014 | 3 MIN READ
How To Guides and Tutorials
Changing Passwords in a Post Heartbleed Bug World
From a home security standpoint, the main gatekeeper is the house key. It’s small, portable and fairly...Apr 15, 2014 | 5 MIN READ
Mobile Security
Appearances Can Be Deceiving: Fake Anti-Virus App Dupes Users
If the laws of nature are capable of teaching us one thing it’s this: if it seems...Apr 15, 2014 | 4 MIN READ
Privacy & Identity Protection
Five-Year-Old Boy Hacks His Xbox One
For most five year-olds, rule breaking usually consists of jumping in puddles and staying up past bedtime....Apr 10, 2014 | 4 MIN READ
Mobile Security
Fandango and Credit Karma Mobile Apps Put Users At Risk
A night at the movies previously meant compromising between an edge-of-your-seat thriller and that new Nora Ephron...Apr 08, 2014 | 4 MIN READ
Executive Perspectives
International Security Standards and the Internet of Things
security standards and the internet of things (IoT) are eveolving at the the international level, and they are needed.Apr 07, 2014 | 3 MIN READ
McAfee Labs
Trojan Hides in ROM of Chinese Android Devices
In China, some mobile phone geeks like to refresh their Android machines with images from the Internet....Apr 02, 2014 | 4 MIN READ
Privacy & Identity Protection
Your Identity Takes Flight With Angry Birds’ Data Sharing Policies
Back in the heyday before the Internet, and even before the telephone, there was one somewhat-reliable way...Mar 31, 2014 | 4 MIN READ