Articles by Author
Family Safety
6 Tips for Protecting Your Social Media Accounts
10 years ago, many of us were hearing about social media for the first time. Now, social...Apr 20, 2015 | 3 MIN READ
Executive Perspectives
Predictive Analytics: The Future Is Now
Enhanced analytical capabilities will help organizations better understand how attacks will unfold, and how to stop them...Apr 16, 2015 | 3 MIN READ
Internet Security
‘Secret Chat’ Messages Aren’t So Secret After All
The universal truth about secrets? They almost always tend to get leaked. This was the case for...Apr 14, 2015 | 3 MIN READ
McAfee Labs
VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials
A recent ransomware variant of Vaultcrypt both tidies up after itself and steals the victim's web page login data.Apr 13, 2015 | 4 MIN READ
Privacy & Identity Protection
What is a Virus?
Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus....Apr 13, 2015 | 3 MIN READ
Internet Security
Here’s What You Need To Know About Botnets
In the year of 2000, Professor Vijay Pande, a renowned Stanford University researcher, released a little program...Apr 09, 2015 | 4 MIN READ
Security News
British Airways Frequent Flyers Report Stolen Air Miles
Frequent flyers, beware. Tens of thousands of accounts may have been compromised due to an automated attack...Apr 01, 2015 | 3 MIN READ
Family Safety
What Leads a Child to Connect with Strangers Online?
At a recent ladies’ get-together, discussion about the murky world of online grooming, cyber stalking, and identity...Apr 01, 2015 | 5 MIN READ
Executive Perspectives
Defending Cyber-Physical Systems from Attack Chains
A strong defense against compromise involves three layers: hardening devices, securing communications, and monitoring behavior. If criminals...Mar 31, 2015 | 4 MIN READ
Security News
Google Brings Safe Browsing to the Masses With Its Safe Browsing API
The best way to protect yourself from the malicious programs (often called malware) hidden across the Internet,...Mar 30, 2015 | 3 MIN READ
Executive Perspectives
Protect Your Web Applications
Reverse proxies are critical to shield Web apps from external attacks. Many organizations today are concerned about...Mar 24, 2015 | 2 MIN READ
Mobile Security
Extend Mobile Call Time with Battery Optimizer
Nowadays, most people are constantly on the go–multi-tasking while moving from one place to the next. The...Mar 24, 2015 | 2 MIN READ