Articles by Author
McAfee News
2014: Security Year in Review
From the Heartbleed bug to large-scale (and highly publicized) data breaches, Shellshock to mobile threats—2014 did not...Dec 29, 2014 | 3 MIN READ
McAfee Labs
Slow File Infector Spies on Victims
Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware...Dec 22, 2014 | 4 MIN READ
Mobile Security
What is Ransomware?
Imagine that you want to pull up a certain file on your computer. You click on the...Dec 22, 2014 | 3 MIN READ
McAfee Labs
InstallCube: How Russian Programmers Turn Adware Into Cash
We often observe applications bundled with ad-displaying programs to generate revenue for those products. These are not...Dec 16, 2014 | 5 MIN READ
Mobile Security
WhatsApp with End-to-End Encryption?
Throughout the past year, many mobile messaging apps have come under fire for inherent security vulnerabilities. This...Dec 16, 2014 | 3 MIN READ
Privacy & Identity Protection
Should You Use Near-Field Communications?
Have you ever wondered what kind of superpower you’d have? I’ve always wanted to send messages and...Dec 15, 2014 | 3 MIN READ
Privacy & Identity Protection
Doxxing, The Internet and How You Can Lock Down Your Data
There exists, in this world of ours, a term describing the public release of a person’s identity...Dec 09, 2014 | 4 MIN READ
Privacy & Identity Protection
What is Pharming?
. For a lot of kids today, mash-ups are all the rage—whether it’s combining two videos, two...Dec 08, 2014 | 2 MIN READ
Family Safety
Youth & Social Media
The digital world is here to stay. The youth are growing up with and making internet technologies,...Dec 03, 2014 | 3 MIN READ
Family Safety
McAfee’s New Digital Safety Program at the 2014 CED Fall Policy Conferencece
This week I had the privilege of visiting Washington, D.C., to attend the Committee for Economic Development...Nov 14, 2014 | 3 MIN READ
McAfee Labs
Exploit Kits Improve Evasion Techniques
Exploit kits are toolkits that malicious developers use to take advantage of client-side vulnerabilities, targeting web browsers...Nov 12, 2014 | 2 MIN READ
Mobile Security
App Inventor Enables the Easy Creation of Malicious Apps
In today’s increasingly connected society, heaps of new mobile apps are cropping up every day. It no...Nov 04, 2014 | 3 MIN READ