Articles by Author
McAfee Labs
AshleyMadison Hack Demonstrates Power of Scam Artists
This blog post was written by Armando Rodriguez. Last month, cybersecurity journalist Brian Krebs broke the news...Aug 26, 2015 | 5 MIN READ
Mobile Security
Your mobile apps could be spying on you and telling secrets!
Simple tips to protect your data, identity and privacy on your mobile devicesAug 24, 2015 | 4 MIN READ
Internet Security
The Mysterious, Ominous Dark Web: A Primer for the Rest of Us
The Dark Web is the dangerous alleyway of the Internet, and only a few people go there. Here's what you...Aug 24, 2015 | 4 MIN READ
Privacy & Identity Protection
Passwords in Real Life: Don’t be Lazy
It’s tough being responsible sometimes. And managing responsibilities for what is precious in your life usually takes...Aug 03, 2015 | 2 MIN READ
Family Safety
An Aware Child is Safer Online
A Parent’s Handy Primer on Cyber Vocabulary – Part IV Aaaaaand, we are back! *drum rolls* This...Aug 01, 2015 | 3 MIN READ
Mobile Security
A Simple Text Puts 95% of Android Devices in the Hotseat
Earlier this week, a new vulnerability was discovered, potentially afflicting up to 950 million Android devices. And it all started...Jul 30, 2015 | 5 MIN READ
Security News
Forgot Where You Were Yesterday? Google Has You Covered.
Google has introduced Your Timeline for its Google Map site and Android devices, which documents location history. How does it...Jul 29, 2015 | 3 MIN READ
Mobile Security
Think Twice Before Trusting These 14 Android Apps with Your Login Information
In life, there are a handful of people that each of us truly trust – and can...Jul 28, 2015 | 3 MIN READ
Privacy & Identity Protection
Remote Jeep Hacking Successful: Time to Patch Your Car?
This blog post was written by Bruce Snell. Next month I’ll be moving back to the US...Jul 22, 2015 | 3 MIN READ
Privacy & Identity Protection
Mr. Robot Gets Hacking Right. Here’s How
If you have an interest in cybersecurity and popular culture, do yourself a favor now: go watch Mr. Robot. Here's...Jul 20, 2015 | 4 MIN READ
Internet Security
Social Media Swamped by Social Botnets
A social botnet uses social media platforms to create a network of fake profiles linked together to spread malicious links...Jul 17, 2015 | 4 MIN READ
Privacy & Identity Protection
Don’t Rely on the Password Reset
Think about your keychain. It probably holds the necessities: car keys, home keys, work keys, miscellaneous keychains...Jul 13, 2015 | 2 MIN READ