Featured Blogs
No Winners at QR Code Roulette
Last year a friend had a bright idea for a party game that involved a series of QR codes in...
15 Minutes with… David O’Berry
Welcome to “15 minutes with” – an occasional contribution between myself and the movers-and-shakers within McAfee’s technical community. This week...
Rooting Exploit for Android Works Silently
In our last blog about Android malware, we discussed the expanding threat landscape for Android malware. Recently, we received an...
Spitmo vs Zitmo: Banking Trojans Target Android
SpyEye and Zeus are probably the most prevalent and active Trojan “banker” families seen in the wild. (Bankers steal bank...
Why Does My Car Have Its Own Smartphone?
You would be surprised at the number of places you can find a GSM SIM card. Outside of your mobile phone,...
Guide To Online Banking Safety for Confident Consumers
A recent poll revealed that 54% of U.S. consumers said the theft of their personal or financial information worried them...
Myth: Apple Products Don’t Get Viruses
Have you ever bitten into an apple and found a worm? I have, and it’s yummy! Anyway, how many times...
15 Social Media Security Tips
1. Realize that you can become a victim at any time. Not a day goes by when we don’t hear...
Dissecting Zeus for Android (or Is It Just SMS Spyware?)
Zeus, also known as ZBot, is one of best-known malware in the industry. The main purpose of this malware is...
Social Networking Security Awareness
One in five online consumers has been a victim of cybercrime in the past two years. Social networking is a...