Featured Blogs
4 Mobile Malware Threats You Can’t Even See
By 2030, experts predict that there will be 5 billion devices connected to 5G.1 For the general population, this connectedness...
Mobile Spyware: How Hackers Can Turn Your Phone Into a Stalking Machine
Some crooks and shady characters will invade your privacy simply by asking for your permission to snoop—through invasive apps you...
How Do Hackers Hack Phones and How Can I Prevent It?
The threat of having your phone hacked has become a common fear. The truth is that it is possible to hack any phone. With the advancement of technology, where discovery of knowledge and information advances the understanding of technology, hackers are able to hack even the most sophisticated phone software. ...
Why Should I Pay for Online Protection?
We all love free stuff. (Costco samples, anyone?) However, when it comes to your family’s security, do free online protection tools offer the coverage...
What Should I do If My Phone Gets Stolen or Lost?
Before your phone gets lost or stolen, put some basic steps in place. You’ll want to act quickly, so preparation...
The Top 5 Scariest Mobile Threats
Scary movies are great. Scary mobile threats, not so much. Ghosts, killer clowns, and the creatures can stir up all...
How To Tell If Your Smartphone Has Been Hacked
It takes a bit of effort, but iPhones can wind up with viruses and malware. And that can indeed lead...
Oh what a difference an “o” can make!
I don’t know about you, but I love Christmas in Australia, long summer days, the sound of cicadas at night,...
"Operation Aurora" Leading to Other Threats
Operation Aurora has received a lot of attention over the past couple of days. To recap, Google, Adobe, and many...
McAfee, Parental Controls, and Apple Devices = Safer Kids Online
Today we announced our McAfee® Family Protection iPhone®, iPod touch® and iPad™ Edition. McAfee now provides strong parental controls to...
Remote Jackpot: Hacking ATMs
Isn’t it just everybody’s dream: to walk up to an ATM, swipe your card, get a flashy screen reading “We...
Stuxnet Update
Stuxnet has received a lot of attention since McAfee first blogged about it in July. This post will answer some of...
Security Connected by the McAfee Channel (by Alex Thurber)
As part of the Mcafee Security Connected initiative launched at FOCUS10, we announced McAfee Security Management 5, which provides a unified monitoring, management, and reporting system that scales to any-sized organization and ensures all endpoints, networks and content are secure.
The Riskiest Web Domains Revealed – Mapping The Malweb
The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to our fourth annual Mapping the Mal...
IRS Fully Reliant on Social Security Numbers
On the Policy, Practice & Procedures page of their website, the IRS addresses the public’s concern regarding Social Security numbers...
Missing Hotel Room Key? Try Your Phone
If you are like me, there are times when you will misplace your hotel key. Times when you’re switching a...
Hacking Wireless for Identity Theft
The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives....
Xirtem Worm Hides in CAB/SFX Files
W32/Xirtem@@MM is a fast-spreading and active worm, discovered in late 2008, that uses a variety of methods to propagate. The...