Articles by Author
Internet Security
Tinder Not So Tender
Tinder is a kind of modern day ‘Hot or Not’ mobile dating app. It finds matches based...Apr 22, 2014 | 4 MIN READ
Mobile Security
What Mobile Users Should Know About Heartbleed: Free McAfee Android App
By now, you have probably heard about the Heartbleed bug, estimated to affect up to two-thirds of...Apr 21, 2014 | 3 MIN READ
How To Guides and Tutorials
Changing Passwords in a Post Heartbleed Bug World
From a home security standpoint, the main gatekeeper is the house key. It’s small, portable and fairly...Apr 15, 2014 | 5 MIN READ
Mobile Security
Appearances Can Be Deceiving: Fake Anti-Virus App Dupes Users
If the laws of nature are capable of teaching us one thing it’s this: if it seems...Apr 15, 2014 | 4 MIN READ
Privacy & Identity Protection
Five-Year-Old Boy Hacks His Xbox One
For most five year-olds, rule breaking usually consists of jumping in puddles and staying up past bedtime....Apr 10, 2014 | 4 MIN READ
Mobile Security
Fandango and Credit Karma Mobile Apps Put Users At Risk
A night at the movies previously meant compromising between an edge-of-your-seat thriller and that new Nora Ephron...Apr 08, 2014 | 4 MIN READ
McAfee Labs
Trojan Hides in ROM of Chinese Android Devices
In China, some mobile phone geeks like to refresh their Android machines with images from the Internet....Apr 02, 2014 | 4 MIN READ
Privacy & Identity Protection
Your Identity Takes Flight With Angry Birds’ Data Sharing Policies
Back in the heyday before the Internet, and even before the telephone, there was one somewhat-reliable way...Mar 31, 2014 | 4 MIN READ
Privacy & Identity Protection
The Drone that can Fly and Spy on Your Smartphone
For many, the notion of a flying drone conjures an image of an unmanned airborne military surveillance...Mar 26, 2014 | 4 MIN READ
Mobile Security
Mobile Malware in 2014
As the world becomes increasingly mobile, criminals are prioritizing their scams to target smartphone and tablets users...Mar 25, 2014 | 4 MIN READ
Privacy & Identity Protection
Google Docs Phishing Campaign is Frighteningly Accurate
Gmail users beware: a very convincing, very deceitful, phishing scam has been making its way around the...Mar 21, 2014 | 4 MIN READ
Privacy & Identity Protection
What is a Denial-of-Service Attack?
You may have heard news reports about popular websites such as CNN, Amazon and Yahoo! being taken...Mar 18, 2014 | 3 MIN READ