Featured Blogs
2014 Threats Predictions: Cybercrime and Hacktivism Will Continue to Grow
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions....
Instagram Direct: Your Private Messages to Marketers
A picture may really be worth a thousand words when it comes to how we communicate and consume media on...
2014 Threats Predictions: Software Defined Networking And More
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions....
Variant of Pony Botnet Pickpockets Bitcoin Users
Last month the Pony Botnet became a household name when it was revealed that it had stolen more than two...
Snapchat Hacked: 4.6M Phone Numbers Leaked
Snapchat is, undeniably, one of the great tech success stories of 2013. The photo sharing app, known for it’s deletion...
2014 Threats Predictions: Cloud Attacks Could Lead to Data Loss
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In...
Instagram Direct: What Parents Need to Know
We’ve written a lot about Instagram and SnapChat; both are popular photo/video sharing apps for teens and both pose threats to...
Lost Your Luggage? There’s an App for That
Did you know that worldwide, 1% of all luggage was mishandled last year—a percentage that may seem small, but actually...
WhatsApp With That? Security Flaw in Mobile Messaging Apps
Mobile phone calls and text messages seem to be going the way of the dinosaurs. In their place, a plethora...
Suspicious Apps on Google Play Leak Google Account IDs
The Google account ID (or account name), which in most cases is a Gmail address, is one of the key...
‘Pony’ Botnet Gallops Off With 2 Million Passwords
In what appears to be a worldwide attack, cybercriminals have successfully stolen 2 million account passwords with a botnet known...
McAfee LiveSafe Knocks it out of the Park as PCMag Editors’ Choice
I’ve said it for some time—the world today is becoming increasingly connected, both on-and-offline. Everything from our shopping to banking,...
Flashlight App Steals Data, Leaves Users in Dark
Ahh, the good old days—when flashlights were simple, handheld devices, used to help light your way… Not light producing mobile...
Analyzing the Recent Windows Zero-Day Escalation of Privilege Exploit
Recently we caught a malicious sample that exploits a PDF vulnerability–CVE-2013-3346, we believe–and executes after a use-after-free condition occurs. During...
Electronics in Flight: How Harmful are Mobile Devices to Your Aircraft?
We all know the drill: before takeoff and landing the flight attendants do a final safety inspection, walking up and...
Helping Your Daughter Handle Mean Girls Online
It was an ordinary Tuesday after school. Sixteen year-old Allison was texting back and forth with her best friend Katie; both were...
Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing!
An Indian investigative portal Cobrapost, recently released a report on alleged online reputation smearing/management/campaigns designed to gain/destroy political capital for who ever was...
LG Smart TVs Leak Data Without Permission
Deals abound on gadgets and gizmos in the wintry weeks before Christmas, but could that shiny new toy on your...