Articles by Author
Privacy & Identity Protection
The Latest Pawn in the Warranty Fraud Game? Fitbit Users
With great technology comes great responsibility. This is particularly true when it comes to protecting technology. And...Jan 11, 2016 | 3 MIN READ
McAfee Labs
New TeslaCrypt Ransomware Arrives via Spam
During the last couple of weeks, McAfee Labs has observed a huge increase in spam related to...Jan 05, 2016 | 7 MIN READ
McAfee Labs
SMS Phishing Campaign Spreads in China
Phishing messages and fake websites for stealing users’ credentials are a common occurrence. Recently, however, mobile banking...Jan 05, 2016 | 3 MIN READ
McAfee News
Security, By the Numbers, Is Big
When you quantify security, the numbers are big and plentiful. The reality of data being compromised is...Jan 04, 2016 | 4 MIN READ
Family Safety
Be Aware of This Rising Menace – Body Shaming
Hello All, We are officially in the last day of 2015. These years just seem to fly...Dec 31, 2015 | 4 MIN READ
Mobile Security
Behind the Mobile App: Your Data Exposed
Taylor Swift dropped a musical explosion when she released her music video for the song “Bad Blood”...Dec 22, 2015 | 3 MIN READ
Privacy & Identity Protection
Learn How to Spot a Phishy Email and Stay Safe
This blog post was written by Bruce Snell. One piece of advice I always give (after update,...Dec 13, 2015 | 6 MIN READ
Family Safety
Now Dolls Can be Hacked Too
This blog post was written by Bruce Snell. Soon after posting our Most Hackable Gifts blog, NBC...Dec 03, 2015 | 3 MIN READ
Mobile Security
Land of the Lost Mobile Phones
Have you ever experienced that panicked moment when you realize you can’t find your mobile phone? You...Nov 24, 2015 | 3 MIN READ
Mobile Security
Smart Home, or Dumb Home/Smart Cloud?
At the end of my street, tucked between some bushes and a tree in someone else’s garden,...Nov 13, 2015 | 4 MIN READ
Privacy & Identity Protection
Introducing the ‘Most Hackable’ Gifts of the Holiday Season
Let’s take a look at this year’s most hackable holiday gifts, and how you can easily make them more secure.Nov 10, 2015 | 5 MIN READ
Mobile Security
Mobile Attacks: The Golden Age for Hackers
It’s fun to re-watch shows like “Friends” and realize that so many plot lines are irrelevant today...Nov 10, 2015 | 3 MIN READ