Articles by Author
McAfee News
The Quarterly Threats Report: What Does It Mean for You?
This blog was written by Bruce Snell. The latest edition of the Quarterly Threats Report (QTR) was...Sep 14, 2016 | 6 MIN READ
McAfee News
Building Bridges to a More Connected Security Environment
For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of...Sep 13, 2016 | 2 MIN READ
Mobile Security
Plug with Caution! How to Stop Hackers from Stealing More than Battery Power
With every message, refresh, and alert, our mobile devices consume tons of energy, and are dying like never before.Sep 13, 2016 | 4 MIN READ
Mobile Security
The Android Photo Hack: A Picture Says a Thousand Commands
Most people have heard the story of the Trojan horse. We’ve learned the moral of that story:...Sep 09, 2016 | 4 MIN READ
Internet Security
The increasing threat of hackers at major sporting events
This blog post was written by Nick Viney. Every year, sporting events around the world become a...Sep 09, 2016 | 2 MIN READ
McAfee News
Techies Give Back at Tech Forum
This blog was written by Chance Hoover. Earlier this month, more than 100 channel partner engineers from...Sep 07, 2016 | 4 MIN READ
Privacy & Identity Protection
Microsoft Discovers Malware in Word Files! Here’s What You Need to Know
Microsoft Word is omnipresent. Students use it for their academic careers and office workers, well, office workers...Sep 06, 2016 | 3 MIN READ
Family Safety
Keep Your Data Safe While Unplugging on Vacation
When you are packing your bags for a long weekend break or a family holiday, do you...Sep 01, 2016 | 3 MIN READ
Family Safety
When Voice Recognition Goes Wrong: YouTube Videos Can Say “Ok Google”
It just takes a few well-placed words in the video’s audio, and our devices can be ready to obey. After...Aug 31, 2016 | 3 MIN READ
Mobile Security
The Four Mobile Security Threats You Need to Know About
Cybercriminals are all about keeping up with trends—no, not ski masks and gloves—but hacking the latest tech trends.Aug 30, 2016 | 4 MIN READ
Mobile Security
How Virtual Reality and Facebook Photos Helped Researchers Hack Biometric Security
Years ago, holograms were considered science-fiction. Things have changed. Within recent memory, we’ve gone from seeing well-loved,...Aug 24, 2016 | 4 MIN READ
Mobile Security
80% of Android Phones Are at Risk! Luckily, People Can Use Encryption for Safety
Let’s imagine you traveled back in time, smartphone in pocket. Let’s say a medieval peasant sees you...Aug 19, 2016 | 4 MIN READ