Consumer

Get online safety tips and stay up to date on the latest computer security news, like what third-party apps are safe to install.

Mobile and IoT Security McAfee Labs

Trojan Hides in ROM of Chinese Android Devices

In China, some mobile phone geeks like to refresh their Android machines with images from the Internet. For some mobile phone dealers, this makes good business. They can earn extra money from refreshing phone ROMs for those users who want to erase a lot of useless applications in the original ...

Family Safety

Parents: Are Your Kids Ignoring the Danger of Dating Apps?

The willingness to date a stranger is nothing new. Remember the personal section of newspapers? How about the TV show Love Connection or that well-meaning friend that set you up with the “perfect” guy? Along with the Internet came online dating sites such as eHarmony that quickly mainstreamed digital dating. ...

Consumer Threat Notices

Your Identity Takes Flight With Angry Birds’ Data Sharing Policies

Back in the heyday before the Internet, and even before the telephone, there was one somewhat-reliable way of spreading information far and fast: the carrier pigeon. These modern-day sky-rats were capable of delivering messages up to 100 miles away and returning to their roost in a single day. Yet they ...

Mobile and IoT Security McAfee Labs

Suspicious Mobile App Finds Your Gmail, Facebook, and Twitter Accounts

Today many people use multiple web services, such as social networking and messaging services. Some users explicitly show their identity in these services, but others visit those services separately–as unidentifiable, different users. To protect their privacy, the latter group might not want their accounts and activities on multiple services to ...

Consumer Threat Notices

The Drone that can Fly and Spy on Your Smartphone

For many, the notion of a flying drone conjures an image of an unmanned airborne military surveillance machine, or a high-flying courier sent to deliver your latest Amazon purchase. As a developing technology, the threat of drones being used for cybercriminal sabotage (especially on civilians, such as you and I) ...

Family Safety

Yik Yak & Omegle: Two Apps Kids Need to Delete ASAP

So I’ve been trying to put myself in the shoes of people who can’t seem to get enough of using anonymous apps. I want to understand the strange attraction so if there’s actually a redeeming side to this discussion, I want to be objective and highlight that for our readers. ...

Mobile and IoT Security

Mobile Malware in 2014

As the world becomes increasingly mobile, criminals are prioritizing their scams to target smartphone and tablets users more than ever before. Our recent McAfee Labs Threats Report: Fourth Quarter 2013  identified 3.73 million total pieces of mobile malware in 2013, and an astounding 197% increase of total samples from the ...

Consumer Threat Notices

Google Docs Phishing Campaign is Frighteningly Accurate

Gmail users beware: a very convincing, very deceitful, phishing scam has been making its way around the Internet. The scam targets Google Doc and Google Drive users with a lookalike login page designed to steal your username and password. With 425 million active monthly Gmail users, these “phishermen” have cast ...

Identity Protection

What is a Denial-of-Service Attack?

You may have heard news reports about popular websites such as CNN, Amazon and Yahoo! being taken down by a DoS attack, but have you ever wondered what DoS means? This common tech term stands for “denial-of-service,” where an attacker attempts to prevent legitimate users from accessing a website entirely ...

Mobile and IoT Security

Smartphone Kill Switch Could Become Federal Law

There is no doubt that mobile devices are an integral part of our daily lives, making their potential loss all the more detrimental. Aside from using smartphones to communicate with friends and family, find restaurants, and check email, they serve as repositories for more and more sensitive, personal information. The ...

Subscribe to McAfee Securing Tomorrow Blogs