Articles by Author
Mobile Security
Why You Should Think Before Geotagging that Selfie
Do you remember the first time you posted on social media? Maybe it was a blog on...May 24, 2016 | 3 MIN READ
Privacy & Identity Protection
Old Breach Revisited: Cybercriminal Sells 117 Million LinkedIn Credentials
This week, a cybercriminal group going by the moniker “Peace” made headlines across the Internet. Peace didn’t...May 19, 2016 | 3 MIN READ
Family Safety
Talk to Your Kids About Online Safety, Sextortion On The Rise
This blog was written by Bruce Snell. In my day-to-day activities at McAfee, I deal with a...May 18, 2016 | 6 MIN READ
Privacy & Identity Protection
Fad Diet Ads Online Open the Door for Cybercriminals
Fad diets have tempted people throughout history. At the turn of the 20th century, the Tapeworm Diet...May 17, 2016 | 4 MIN READ
McAfee News
McAfee Corporate Marketing Priorities
As we move into the second half of 2016, I hope you and your marketing teams have...May 10, 2016 | 2 MIN READ
Mobile Security
Phishing Goes Mobile: New Android Malware Hits Google Play
Sometimes, things just aren’t as they seem to be. For example, last year, Google Play hosted a...May 06, 2016 | 3 MIN READ
Internet Security
It’s World Password Day! Time to Beef Up Your Password Security
Our passwords hold the keys to our digital lives. We use them to access bank accounts, medical...May 05, 2016 | 5 MIN READ
Internet Security
How To Protect Yourself From The Malware That’s Costing Consumers Millions
This blog post was written by Nick Viney. You may have heard about the hack of a...May 04, 2016 | 3 MIN READ
McAfee Labs
CVE-2016-0018: DLL Planting Leads to a Remote Code Execution Vulnerability
DLL planting, also known as DLL side loading, is a popular attack technique today. If we take...Apr 27, 2016 | 4 MIN READ
McAfee Labs
Malware Takes Advantage of Windows ‘God Mode’
Malware is taking advantage of the lesser known Windows "God Mode".Apr 26, 2016 | 3 MIN READ
Mobile Security
Spotify and Minecraft Account Info Posted Online, Are You Safe?
This blog was written by Bruce Snell. One of my favorite scenes in The Avengers is when...Apr 26, 2016 | 6 MIN READ
Mobile Security
The SS7 Flaw: What it is, and How Hackers Abuse It
Users don’t always have it easy when it comes to online security. Beyond the plethora of passwords,...Apr 26, 2016 | 3 MIN READ