McAfee

Blog Archives

LinkedIN Twitter
We're here to make life online safe and enjoyable for everyone.

Articles by Author

Mobile Security
Mobile Bankers Beware: A New Phishing Scam Wants Your Money
As a growing number of smartphone owners get increasingly comfortable using their mobile devices for everything from...
Privacy & Identity Protection
Bitcoin Headlines Attract Malware Developers
Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate. In the...
Security News
Don’t Take a Bite out of that Apple Gift Card Scam
Good rule of thumb on the web: When it seems too good to be true, it probably...
Mobile Security
BYOD: Balancing Convenience and Security
It lies next to you as you sleep, comes with you to work, rides home with you...
Family Safety
What Are the Risks of Geo-Location?
Using your mobile’s built-in global positioning system (GPS) functionality allows location-based services (or geo-location) to locate and...
Mobile Security
Spy? Where? Mobile Spyware Hiding Right Under Your Nose
Some days it feels like the whole world is going mobile. We tweet, we text, we browse...
McAfee Labs
Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code
Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient...
Family Safety
Cheating and Bullying: It’s a Bigger Problem than You Think!
The whole purpose of your “youth” is to grow and learn. It’s time to take in lots...
Mobile Security
Introducing App Reputation for Android Apps
McAfee has always been in the forefront of finding new ways to secure our customers against threats...
Mobile Security
Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors
Nothing in life is free, and that’s especially true when it comes to mobile apps. Thousands of...
Family Safety
What is a Keylogger?
Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital...
McAfee Labs
Malware Manipulates Procedure Prologue and Epilogue to Evade Security
Techniques used by malware developers to evade detection by security software have changed drastically in recent years....
1309 - 1320 of 1416

Stay Updated

Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats.

FacebookTwitterInstagramLinkedINYouTubeRSS
Back to top