Articles by Author
Mobile Security
Like This Post – And Get Hacked
With every message, refresh, and alert, our mobile devices consume tons of energy, and are dying like never before.Sep 27, 2016 | 4 MIN READ
Security News
Cybercriminals Breach Yahoo, Impacting 500 Million Users
When it comes to data breaches there are hits and there are misses. And then there are...Sep 22, 2016 | 3 MIN READ
Mobile Security
Selfies with Boarding Passes: A Silent Cybersecurity Risk
Who doesn’t look forward to their next vacation or holiday? With a simple plane ticket, you can...Sep 22, 2016 | 4 MIN READ
Privacy & Identity Protection
MasterCard Wants to Verify by Selfies and Fingerprints! The Ripple Effects of Biometrics?
MasterCard plans on using security measures based on bodily data, such as photo-recognition and fingerprint identification.Sep 19, 2016 | 4 MIN READ
McAfee Labs
Locky Ransomware Hides Inside Packed .DLL
McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in an earlier...Sep 16, 2016 | 5 MIN READ
Family Safety
Are Your Kids Into These 5 Unwanted Trends On Social Media?
Yesterday I picked up a friend’s child, who was returning from the week long class trip to...Sep 15, 2016 | 4 MIN READ
Mobile Security
Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware
As smartphones get more sophisticated, it’s easy to forget their humble origins. Through today’s mobile apps,...Sep 15, 2016 | 5 MIN READ
McAfee News
The Quarterly Threats Report: What Does It Mean for You?
This blog was written by Bruce Snell. The latest edition of the Quarterly Threats Report (QTR) was...Sep 14, 2016 | 6 MIN READ
McAfee News
Building Bridges to a More Connected Security Environment
For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of...Sep 13, 2016 | 2 MIN READ
Mobile Security
Plug with Caution! How to Stop Hackers from Stealing More than Battery Power
With every message, refresh, and alert, our mobile devices consume tons of energy, and are dying like never before.Sep 13, 2016 | 4 MIN READ
Mobile Security
The Android Photo Hack: A Picture Says a Thousand Commands
Most people have heard the story of the Trojan horse. We’ve learned the moral of that story:...Sep 09, 2016 | 4 MIN READ
Internet Security
The increasing threat of hackers at major sporting events
This blog post was written by Nick Viney. Every year, sporting events around the world become a...Sep 09, 2016 | 2 MIN READ