Featured Blogs
2014 Threats Predictions: Cloud Attacks Could Lead to Data Loss
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In...
Instagram Direct: What Parents Need to Know
We’ve written a lot about Instagram and SnapChat; both are popular photo/video sharing apps for teens and both pose threats to...
Lost Your Luggage? There’s an App for That
Did you know that worldwide, 1% of all luggage was mishandled last year—a percentage that may seem small, but actually...
WhatsApp With That? Security Flaw in Mobile Messaging Apps
Mobile phone calls and text messages seem to be going the way of the dinosaurs. In their place, a plethora...
11 Steps to Improve your Personal Digital Security
Everyone with an account on a smart phone, tablet, laptop or PC also knows about phishing, scamming, password and identity...
Suspicious Apps on Google Play Leak Google Account IDs
The Google account ID (or account name), which in most cases is a Gmail address, is one of the key...
‘Pony’ Botnet Gallops Off With 2 Million Passwords
In what appears to be a worldwide attack, cybercriminals have successfully stolen 2 million account passwords with a botnet known...
McAfee LiveSafe Knocks it out of the Park as PCMag Editors’ Choice
I’ve said it for some time—the world today is becoming increasingly connected, both on-and-offline. Everything from our shopping to banking,...
Flashlight App Steals Data, Leaves Users in Dark
Ahh, the good old days—when flashlights were simple, handheld devices, used to help light your way… Not light producing mobile...
Analyzing the Recent Windows Zero-Day Escalation of Privilege Exploit
Recently we caught a malicious sample that exploits a PDF vulnerability–CVE-2013-3346, we believe–and executes after a use-after-free condition occurs. During...