Articles by Author
McAfee Labs
Botnet Control Servers Span the Globe
McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet. With millions...Jan 23, 2013 | < 1 MIN READ
Privacy & Identity Protection
Malware Disguised as Java Update: Careful What You Download!
All too often, cyber attacks are crimes of opportunity. This was exactly the case when late last...Jan 22, 2013 | 3 MIN READ
McAfee Labs
The Future of Hacktivism and Anonymous
After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding...Jan 18, 2013 | 6 MIN READ
Privacy & Identity Protection
How to Protect Your Devices from a Fast Spreading Java Virus
Last week, a new security issue surfaced for a popular programming language known as Java. This Java...Jan 15, 2013 | 4 MIN READ
Executive Perspectives
The 3 R’s: Riches, Ruins & Regulations
We previously wrote about what it means to be a security-obligated executive – how to identify threat...Jan 11, 2013 | 3 MIN READ
Family Safety
Internet Safety Resolutions for 2013
My daughter loves forming New Year resolutions! Every January 01, she diligently pens down her resolutions (always...Jan 10, 2013 | 3 MIN READ
Family Safety
Is Your SNS Addiction Getting Out of Hand? – All Names Aren’t Cool
The news that went viral on social networking sites last week made me smile and shake my...Jan 10, 2013 | 3 MIN READ
McAfee Labs
Red Kit an Emerging Exploit Pack
Exploit kits are toolkits that are used to build malware components such as binaries and scripts. They...Jan 09, 2013 | 3 MIN READ
McAfee Labs
If You Deploy Only Antivirus, It Will Cost You More and Make You Less Secure
Everyone’s looking to shave their IT budgets, manage fewer vendors and streamline. The plethora of low cost...Jan 04, 2013 | 3 MIN READ
McAfee Labs
YouTube Video Scam Targets Facebook Users
Be advised cybercriminals are at it again, leveraging the popularity of Facebook and YouTube to scam consumers.We...Jan 03, 2013 | 5 MIN READ
McAfee News
A Look Back: Top 5 Security Trends of 2012
As we look back on 2012, it’s impossible not to recall the many high-profile breaches and cybersecurity...Dec 26, 2012 | 6 MIN READ
Privacy & Identity Protection
W32/Autorun Worm: A Nasty Bug for Your Computer
What do you think of when you hear the word “malware”? Most people think of the general...Dec 13, 2012 | 4 MIN READ