Featured Blogs
The Top 5 Scariest Mobile Threats
Scary movies are great. Scary mobile threats, not so much. Ghosts, killer clowns, and the creatures can stir up all...
How to Tell If Your Phone Has Been Hacked and What to Do
Learn the signs of a hacked phone so you can act quickly and protect your data. Discover tips to secure your phone from hackers and prevent future attacks.
How Do Hackers Hack Phones and How Can I Prevent It?
Understand common hacker attack methods and how to prevent and protect your data. Stay safe from phishing, malware, and other mobile security threats.
Helpful Tips for Safe Online Shopping
Thanksgiving—not before Halloween as we see things in stores and online now. It seems like the holiday season and decorations...
App Locks Can Improve the Security of Your Mobile Phones
The practice of locking our possessions is relevant in every aspect of our modern lives. We physically lock our houses,...
"Operation Aurora" Leading to Other Threats
Operation Aurora has received a lot of attention over the past couple of days. To recap, Google, Adobe, and many...
Remote Jackpot: Hacking ATMs
Isn’t it just everybody’s dream: to walk up to an ATM, swipe your card, get a flashy screen reading “We...
Stuxnet Update
Stuxnet has received a lot of attention since McAfee first blogged about it in July. This post will answer some of...
The Riskiest Web Domains Revealed – Mapping The Malweb
The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to our fourth annual Mapping the Mal...
Missing Hotel Room Key? Try Your Phone
If you are like me, there are times when you will misplace your hotel key. Times when you’re switching a...
Xirtem Worm Hides in CAB/SFX Files
W32/Xirtem@@MM is a fast-spreading and active worm, discovered in late 2008, that uses a variety of methods to propagate. The...
Google Tool Cleans Up Mobile Malware ‘Dream’
Over the weekend Google released the Android Market Security Tool to help clean up devices infected with the DroidDream malware. The Android/DrdDream...
LizaMoon the Latest SQL-Injection Attack
Working in the security industry brings about a myriad of challenges. This is especially true for vendors. We must do...
5, 4, 3, 2, 1: Osama Bin Laden Death Scams
I suppose this was inevitable. The reported death of Osama Bin Laden is just too good a lure for cybercriminals...
Drive-By Downloads Attack Adobe Zero-Day Flaw
Adobe released a security advisory warning the users of a zero-day vulnerability in Adobe Flash Player Versions 10.2.152.33 and earlier....
I Smell a RAT: Java Botnet Found in the Wild
Most of today’s malware works on Windows and its apps, because it can affect a lot of people around the...
Fake-Alert Scams Growing Again
Fake-alert Trojans, also known as scareware, fool consumers by claiming imaginary threats, and insisting its victims purchase a product to...
Mac ‘Protector’: Another Fake-Alert in Disguise
It’s not breaking news that fake-alert Trojans infections are growing. But it’s worrying for Mac OS X users to find...
