Articles by Author
Mobile Security
A Simple Text Puts 95% of Android Devices in the Hotseat
Earlier this week, a new vulnerability was discovered, potentially afflicting up to 950 million Android devices. And it all started...Jul 30, 2015 | 5 MIN READ
Security News
Forgot Where You Were Yesterday? Google Has You Covered.
Google has introduced Your Timeline for its Google Map site and Android devices, which documents location history. How does it...Jul 29, 2015 | 3 MIN READ
Privacy & Identity Protection
Think Twice Before Trusting These 14 Android Apps with Your Login Information
In life, there are a handful of people that each of us truly trust – and can...Jul 28, 2015 | 3 MIN READ
Privacy & Identity Protection
Remote Jeep Hacking Successful: Time to Patch Your Car?
This blog post was written by Bruce Snell. Next month I’ll be moving back to the US...Jul 22, 2015 | 3 MIN READ
Privacy & Identity Protection
Mr. Robot Gets Hacking Right. Here’s How
If you have an interest in cybersecurity and popular culture, do yourself a favor now: go watch Mr. Robot. Here's...Jul 20, 2015 | 4 MIN READ
Internet Security
Social Media Swamped by Social Botnets
A social botnet uses social media platforms to create a network of fake profiles linked together to spread malicious links...Jul 17, 2015 | 4 MIN READ
Executive Perspectives
Root of Trust vs. Root of Evil: Part 1
Regulatory compliance is an unloved cost of goods—an expense to be managed, like cafeteria subsidies or fleet...Jul 14, 2015 | 4 MIN READ
Privacy & Identity Protection
Don’t Rely on the Password Reset
Think about your keychain. It probably holds the necessities: car keys, home keys, work keys, miscellaneous keychains...Jul 13, 2015 | 2 MIN READ
Family Safety
An Aware Child is Safer Online
A Parent’s Handy Primer on Cyber Vocabulary – Part II Welcome back to our primer! As you...Jun 30, 2015 | 3 MIN READ
Privacy & Identity Protection
Be Cautious When Using Wi-Fi
The proliferation of mobile devices means that we can work or play online from almost anywhere, so...Jun 23, 2015 | 4 MIN READ
Executive Perspectives
An Effective Community Is More Than Just An Online Forum
It is important to develop a strong base of contributors who can communicate effectively, answer questions, and...Jun 19, 2015 | 3 MIN READ
McAfee Labs
‘Evoltin’ POS Malware Attacks via Macro
Recently McAfee labs found a point-of-sale malware that spreads through malicious macros inside a doc file. This threat arrives via...Jun 10, 2015 | 5 MIN READ