Articles by Author
Privacy & Identity Protection
Before You Share, Ask Yourself “Is This TMI?”
Social networks and new online services make it easy to share the details of our lives, perhaps...Jul 15, 2013 | 4 MIN READ
Mobile Security
What Master Key? – Android Signature Bypass Vulnerability
Recently, a vulnerability in Android package signature verification was announced by Jeff Forristal, CTO of Bluebox Security....Jul 10, 2013 | 4 MIN READ
Internet Security
Internet Browser Cookies: Not What Grandma Used To Make
Imagine you’re surfing the web in search of a new pair of shoes on Zappos.com. You browse...Jul 09, 2013 | 6 MIN READ
Family Safety
Does Kik Messenger Pose a Danger to Your Kids?
With more than 50 million users, and reportedly growing by 20,000 everyday, Kik has become one of...Jul 09, 2013 | 3 MIN READ
Family Safety
What is Typosquatting?
Typosquatting, also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s...Jul 03, 2013 | 3 MIN READ
Mobile Security
McAfee Hidden Device Admin Detector – Free Protection from Android Malware
A few weeks ago, we told you about Obad, a backdoor Trojan that targets the Android operating...Jun 28, 2013 | 4 MIN READ
McAfee Labs
Styx Exploit Kit Takes Advantage of Vulnerabilities
Web-based malware has increased over the last few years due to an abrupt spike in new exploit...Jun 26, 2013 | 4 MIN READ
Privacy & Identity Protection
Are You Stressed Out About Passwords? Consider a Simple Option
Used correctly, passwords help keep your personal information safe, and if you’re like me, you probably have...Jun 26, 2013 | 4 MIN READ
Mobile Security
Mobile Malware Plays Hide and Seek
Android/Obad.A is mobile malware that has been described as very complex. Truly it is one of the...Jun 25, 2013 | 2 MIN READ
Family Safety
“Kik me” – The App Your Kids are Using Now: Kik
When I was young, ‘Kick Me’ was a phrase that was scrawled on a piece of notebook...Jun 20, 2013 | 3 MIN READ
Family Safety
Why it’s Critical to Protect Data on Digital Devices
When devices are lost or hacked and your data is exposed, not only is this a pain...Jun 19, 2013 | 3 MIN READ
Mobile Security
Smart Perimeter – A Security Fence For Your Digital Devices
Everyone has experienced that gut-wrenching feeling when you look around and realize that one of your prized...Jun 11, 2013 | 3 MIN READ