McAfee

Blog Archives

LinkedIN Twitter
We're here to make life online safe and enjoyable for everyone.

Articles by Author

Mobile Security
What is Ransomware?
Imagine that you want to pull up a certain file on your computer. You click on the...
McAfee Labs
InstallCube: How Russian Programmers Turn Adware Into Cash
We often observe applications bundled with ad-displaying programs to generate revenue for those products. These are not...
Mobile Security
WhatsApp with End-to-End Encryption?
Throughout the past year, many mobile messaging apps have come under fire for inherent security vulnerabilities. This...
Privacy & Identity Protection
Should You Use Near-Field Communications?
Have you ever wondered what kind of superpower you’d have? I’ve always wanted to send messages and...
Privacy & Identity Protection
Doxxing, The Internet and How You Can Lock Down Your Data
There exists, in this world of ours, a term describing the public release of a person’s identity...
Privacy & Identity Protection
What is Pharming?
. For a lot of kids today, mash-ups are all the rage—whether it’s combining two videos, two...
Family Safety
Youth & Social Media
The digital world is here to stay. The youth are growing up with and making internet technologies,...
Family Safety
McAfee’s New Digital Safety Program at the 2014 CED Fall Policy Conferencece
This week I had the privilege of visiting Washington, D.C., to attend the Committee for Economic Development...
McAfee Labs
Exploit Kits Improve Evasion Techniques
Exploit kits are toolkits that malicious developers use to take advantage of client-side vulnerabilities, targeting web browsers...
Mobile Security
App Inventor Enables the Easy Creation of Malicious Apps
In today’s increasingly connected society, heaps of new mobile apps are cropping up every day. It no...
Family Safety
What Is a Trojan Horse?
One of history’s great literary classics is Homer’s Iliad, which tells the story of the Trojan horse—the...
Privacy & Identity Protection
What is Criminal Identity Theft?
Identity theft gets all kinds of buzz in the news. It’s not hard to see why—in 2012,...
1177 - 1188 of 1416

Stay Updated

Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats.

FacebookTwitterInstagramLinkedINYouTubeRSS
Back to top