Is the Personal Data on Your Smartphone Vulnerable? Listen to Find Out: Used for everything from banking and taking pictures, to navigating, streaming, and connecting, mobile devices are a treasure trove of sensitive personal data. On the latest episode of “Hackable?” the team investigates how secure that data really is by inviting a white-hat to try and remotely penetrate our host Geoff’s smartphone. Listen now on Apple Podcasts and learn if one errant click could expose everything, including your deleted photos.
“Hackable?” Puts Smartphones to the Test
More from Mobile Security
How to Protect Yourself After the Canvas Education Data Breach + Fake Amazon Recall Texts
A cyberattack on Canvas just exposed data from millions of students, and fake Amazon recall texts are hitting phones nationwide....May 08, 2026 | 6 MIN READ
Now Available: Use ChatGPT with McAfee to Spot Scams Faster
Use ChatGPT with McAfee to check suspicious links, messages, and screenshots in seconds. Learn how this new integration helps you...May 07, 2026 | 3 MIN READ
Ad Impersonation Scams and Record-Breaking Social Media Fraud Losses: This Week in Scams
Social media scams are driving billions in losses, often starting with ads or messages. Learn how these scams work, how...May 01, 2026 | 4 MIN READ
How Do Hackers Hack Phones and How Can I Prevent It?
Understand common hacker attack methods and how to prevent and protect your data. Stay safe from phishing,...Apr 28, 2026 | 14 MIN READ
Fake USPS QR Code Text Scams and a Major Health Data Breach: This Week in Scams
A new fake USPS QR code scam is tricking users into clicking malicious links. Learn how it works, how to...Apr 24, 2026 | 5 MIN READ
Why Hackers Are Collecting Data They Can’t Read Yet. And How to Stay Safe
Hackers are collecting encrypted data today to decrypt later using quantum computing. Learn what “Harvest Now, Decrypt Later” means and...Apr 21, 2026 | 6 MIN READ
Cloud Storage Scam Emails and Record-Breaking Fraud Losses: This Week in Scams
Cloud storage scam emails are back, and new FBI data finds $20B in fraud losses. Learn how about cloud scams, scam key red flags, and...Apr 17, 2026 | 5 MIN READ
Can Your Wearable Health Monitors Be Compromised?
Can wearable health data be hacked or exposed? Learn the risks, how breaches happen, and how to...Apr 13, 2026 | 3 MIN READ
McAfee’s Scam Detector Named Webby Awards Finalist for AI Innovation
McAfee’s Scam Detector is a 2026 Webby Awards finalist and honoree, recognizing its use of AI to detect scams across...Apr 09, 2026 | 2 MIN READ
Oklahoma Tax Breach and FBI Impersonation Scam: This Week in Scams
Hackers accessed taxpayer data in Oklahoma, while scammers impersonating FBI agents are targeting victims nationwide. Here’s what to know and...Apr 03, 2026 | 5 MIN READ
Operation NoVoice: Android Malware Found in 50+ Apps Can Hijack Devices
McAfee’s mobile research team has uncovered a large-scale Android malware campaign we’re tracking as Operation NoVoice. The campaign was distributed through...Mar 31, 2026 | 6 MIN READ
Operation NoVoice: Rootkit Tells No Tales
Authored By: Ahmad Zubair Zahid McAfee’s mobile research team identified and investigated an Android rootkit campaign tracked as Operation Novoice....Mar 31, 2026 | 15 MIN READ
