Featured Blogs
Flashlight App Steals Data, Leaves Users in Dark
Ahh, the good old days—when flashlights were simple, handheld devices, used to help light your way… Not light producing mobile...
Analyzing the Recent Windows Zero-Day Escalation of Privilege Exploit
Recently we caught a malicious sample that exploits a PDF vulnerability–CVE-2013-3346, we believe–and executes after a use-after-free condition occurs. During...
Electronics in Flight: How Harmful are Mobile Devices to Your Aircraft?
We all know the drill: before takeoff and landing the flight attendants do a final safety inspection, walking up and...
Helping Your Daughter Handle Mean Girls Online
It was an ordinary Tuesday after school. Sixteen year-old Allison was texting back and forth with her best friend Katie; both were...
Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing!
An Indian investigative portal Cobrapost, recently released a report on alleged online reputation smearing/management/campaigns designed to gain/destroy political capital for who ever was...
LG Smart TVs Leak Data Without Permission
Deals abound on gadgets and gizmos in the wintry weeks before Christmas, but could that shiny new toy on your...
More Japanese Chat Apps on Google Play Steal Phone Numbers
In two recent blogs, McAfee Labs described Japanese and Korean Android apps on Google Play that steal a mobile device’s...
JavaScript Apps on Google Play Steal Korean Phone Numbers
In a recent blog, McAfee Labs reported on suspicious JavaScript-based Android chat applications for Japanese users. These apps were found...
Japanese Chat App for Android Steals Phone Numbers
Update, December 5 The developer of the app Machin Chat has contacted McAfee and reported that the collection of phone...
7 Things Parents Need to Know About the Voxer Voice App
Every five minutes, it seems, a new app comes out but only a handful stick with tweens and teens looking...
In Memory of Peter Szor
Nov. 20: Update with details of memorial service at the end of this post. Earlier this week the security industry...
Becoming ‘InstaFamous’ – The Apps the Kids are Using Now: Instagram LikeBots
InstaFamous: A person who is famous due to a high amount of followers on Instagram. The Instagram ‘popular’ page boasts...
Cracking Passwords is as Easy as “123”
One month after announcing a corporate data raid affecting 2.9 million of their users, Adobe has found the extent of...
Scrooge’s 12 Scams of the Holidays
They’re baaaack! Actually, they never left—Scrooge’s little trolls work hard all year, scheming and scamming to steal holiday presents—or at...
Solving the Mystery of the Office Zero-Day Exploit and DEP
On November 5 McAfee Labs blogged about a Microsoft Office zero-day attack that we spotted in the wild. In another...
Updates and Mitigation to Microsoft Office Zero-Day Threat (CVE-2013-3906)
On November 5, Microsoft posted Security Advisory 2896666. This vulnerability, discovered by Haifei Li of McAfee Labs, affects multiple versions of Microsoft...
McAfee Labs Detects Zero-Day Exploit Targeting Microsoft Office
Last Thursday morning (October 31), our Advanced Exploit Detection System (AEDS), which we discussed in an earlier post, detected a...
What is a Firewall?
Most of us may have heard the term, and know it’s related to security in some way, but do you...
Why Parents Should Care About SnapChat’s New ‘Stories’ Feature
SnapChat has literally reshaped the teen experience since its release two years ago. The app, which allows a user to...
Periodic Connections to Control Server Offer New Way to Detect Botnets
A number of recent botnets and advanced threats use HTTP as their primary communications channel with their control servers. McAfee...
Oversharing on Social Media Common Amongst 50+
Thanks to social media, societal norms have undergone a seismic shift in the past five years. What was once considered...
Mobile Authentication vs. Mobile Banking and Commerce, Part II
Mobile authentication grants access to online banking – but it’s not exactly mobile banking. The main difference is that mobile...
Revenge Posts on Social Media Could Land You in Jail
After a bad breakup, a scorned lover may choose to channel their anger through ice cream, a good cry, or...
SnapHack: Hacking for the Greater Good?
Most hacks and attacks introduced on this blog are blatantly malicious, looking to nab your valuable information. However, this may...
Nev & Michelle have a Conversation with the Students of Gertz-Ressler High
In honor of National Cyber Security Awareness Month (NCSAM), McAfee joined up with the National Cyber Security Alliance at Gertz-Ressler...
Microsoft Agrees: Home Users Need More than Antivirus Alone
After years of telling users that Microsoft Security Essentials was enough to protect their PCs from security threats, Microsoft has...
What is Scareware?
When it comes to making us fall for their scams, cybercriminals have a number of tricks up their sleeves. One...