Articles by Author
Privacy & Identity Protection
Is Dropbox Dropping in on Your Shared Files?
The ability to instantly share and interact through online sources has become an expected part of our...Sep 20, 2013 | 4 MIN READ
Internet Security
The Search for Celebrity Gossip Could Land Your Phone in Hot Water
They may be glamorous, but celebrities can make things quite ugly when it comes to the safety...Sep 18, 2013 | 4 MIN READ
Privacy & Identity Protection
Mirror Mirror Online, Who Is the Most Dangerous Celebrity of Them All?
We all do it. We probably all just don’t admit it. Well I admit it—I’ve searched for...Sep 16, 2013 | 3 MIN READ
McAfee Labs
Andromeda Botnet Hides Behind AutoIt
Last month, I posted a blog about an increase in the use of AutoIt scripts by malware...Sep 12, 2013 | 6 MIN READ
Family Safety
What is Encryption?
Encryption is the science of encoding and decoding secret messages. It began as cryptography—the ancient Greeks used...Sep 10, 2013 | 3 MIN READ
Internet Security
Hackers are Cashing in on Instagram Likes
They say popularity has its price. This saying holds a new weight when it comes to the...Sep 09, 2013 | 5 MIN READ
Mobile Security
Where, oh Where, Does That QR Code Lead?
What is square, flat, and black and white all over? If you answered “a QR Code”, you’re...Sep 04, 2013 | 5 MIN READ
McAfee Labs
Cidox Trojan Spoofs HTTP Host Header to Avoid Detection
Lately, we have seen a good number of samples generating some interesting network traffic through our automated...Sep 03, 2013 | 6 MIN READ
Mobile Security
Mobile Bankers Beware: A New Phishing Scam Wants Your Money
As a growing number of smartphone owners get increasingly comfortable using their mobile devices for everything from...Aug 21, 2013 | 5 MIN READ
Privacy & Identity Protection
Bitcoin Headlines Attract Malware Developers
Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate. In the...Aug 21, 2013 | 3 MIN READ
Security News
Don’t Take a Bite out of that Apple Gift Card Scam
Good rule of thumb on the web: When it seems too good to be true, it probably...Aug 16, 2013 | 3 MIN READ
Internet Security
BYOD: Balancing Convenience and Security
It lies next to you as you sleep, comes with you to work, rides home with you...Aug 14, 2013 | 6 MIN READ