Featured Blogs
Introducing App Reputation for Android Apps
McAfee has always been in the forefront of finding new ways to secure our customers against threats and risks posed...
5 (Kind) Reminders for Overly Nosy Parents
Last night I sat next to my teenage son as he played video games. It did not take long before...
Android Master-Key Malware Already Blocked by McAfee Mobile Security
The Android Master Key vulnerability, which was first reported by BlueBox Security, has been big news this month. McAfee explained...
Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors
Nothing in life is free, and that’s especially true when it comes to mobile apps. Thousands of free apps are...
Q&A: What is ‘Path’ and Is It Safe for My Child?
Q: I overheard my son telling his friend to message him on Path. What is Path and should I be...
What is a Keylogger?
Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every...
Malware Manipulates Procedure Prologue and Epilogue to Evade Security
Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers,...
Helping Kids Understand Their ‘Digital Footprint’
It’s easy to talk in general about an important topic and apply a catchy phrase to it without our kids...
Before You Share, Ask Yourself “Is This TMI?”
Social networks and new online services make it easy to share the details of our lives, perhaps too easily. With...
Operation Troy: OpenIOC Release
In conjunction with our investigation into Operation Troy, we will be releasing IOC data in the open and highly...