Featured Blogs
Oh what a difference an “o” can make!
I don’t know about you, but I love Christmas in Australia, long summer days, the sound of cicadas at night,...
More Details on "Operation Aurora"
Earlier today, George Kurtz posted an entry, ‘Operation “Aurora” Hit Google, Others’,  on the McAfee’s Security Insight blog The purpose...
"Operation Aurora" Leading to Other Threats
Operation Aurora has received a lot of attention over the past couple of days. To recap, Google, Adobe, and many...
McAfee, Parental Controls, and Apple Devices = Safer Kids Online
Today we announced our McAfee® Family Protection iPhone®, iPod touch® and iPad™ Edition. McAfee now provides strong parental controls to...
Remote Jackpot: Hacking ATMs
Isn’t it just everybody’s dream: to walk up to an ATM, swipe your card, get a flashy screen reading “We...
Remote iPhone Jailbreak Using PDF Exploit Should Serve as Wake-Up Call
Like many iPhone users, I “jailbreak” my iPhone. I do this for many reasons, but mainly for console-level access and...
Zeus Crimeware Toolkit
The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This...
Stuxnet Update
Stuxnet has received a lot of attention since McAfee first blogged about it in July. This post will answer some of...
Security Connected by the McAfee Channel (by Alex Thurber)
As part of the Mcafee Security Connected initiative launched at FOCUS10, we announced McAfee Security Management 5, which provides a unified monitoring, management, and reporting system that scales to any-sized organization and ensures all endpoints, networks and content are secure.
The Riskiest Web Domains Revealed – Mapping The Malweb
The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to our fourth annual Mapping the Mal...
IRS Fully Reliant on Social Security Numbers
On the Policy, Practice & Procedures page of their website, the IRS addresses the public’s concern regarding Social Security numbers...
Missing Hotel Room Key? Try Your Phone
If you are like me, there are times when you will misplace your hotel key. Times when you’re switching a...
Mobile NFC Features Raise Security Concerns
Yesterday, at the Web 2.0 Summit, Google’s CEO Eric Schmidt presented the Nexus S. This wasn’t just about a new...
Hacking Wireless for Identity Theft
The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives....
Xirtem Worm Hides in CAB/SFX Files
W32/Xirtem@@MM is a fast-spreading and active worm, discovered in late 2008, that uses a variety of methods to propagate. The...
Data Privacy Day
This is a critical time for our personal security as it relates to privacy and personal information. A battle is...
Lost or Stolen Mobile Devices Can Lead to Identity Theft
We lose stuff. You put something down, you get distracted, you forget about it and it’s gone. Stuff falls out...
Social Security Numbers Easily Cracked
It is easier than ever to guess or predict an individual’s Social Security number, which puts us all at a...
Google Tool Cleans Up Mobile Malware ‘Dream’
Over the weekend Google released the Android Market Security Tool to help clean up devices infected with the DroidDream malware. The Android/DrdDream...
LizaMoon the Latest SQL-Injection Attack
Working in the security industry brings about a myriad of challenges. This is especially true for vendors. We must do...
Lawmakers Push To Shield Last 4 Social Security Numbers
Most of us have become accustomed to giving out the last four digits of our Social Security numbers. But this...
5, 4, 3, 2, 1: Osama Bin Laden Death Scams
I suppose this was inevitable. The reported death of Osama Bin Laden is just too good a lure for cybercriminals...
Drive-By Downloads Attack Adobe Zero-Day Flaw
Adobe released a security advisory warning the users of a zero-day vulnerability in Adobe Flash Player Versions 10.2.152.33 and earlier....
I Smell a RAT: Java Botnet Found in the Wild
Most of today’s malware works on Windows and its apps, because it can affect a lot of people around the...
Fake-Alert Scams Growing Again
Fake-alert Trojans, also known as scareware, fool consumers by claiming imaginary threats, and insisting its victims purchase a product to...
Mac ‘Protector’: Another Fake-Alert in Disguise
It’s not breaking news that fake-alert Trojans infections are growing. But it’s worrying for Mac OS X users to find...
Most Unwanted Criminals: Phishers, Shoulder Surfers and Keyloggers
McAfee’s most unwanted criminals have included pickpockets, Trojan viruses, and ATM skimmers, dumpster divers, spies, and wireless hackers and now...