Featured Blogs
Mobile Flirting App “Skout” Was Used In 3 Rape Cases
3 minors and 3 men are the center of attention regarding 3 rape cases, the catch? A mobile flirting app...
Should Stickam Be Blocked From Your Child?
Webcams have always been an area of concern for parents with online kids. Webcams can affect the safety and privacy...
Six Easy Steps to Help Keep Hackers at Bay
Cybercriminals are adopting complex and powerful techniques to “hack,” or take control of online accounts belonging to other people or...
Do You Know What Your Kids Are Hiding?
Many of you as parents may think, not much when asked this question. But in reality, it’s probably a lot...
Phishing Attack Replaces Android Banking Apps With Malware
Mobile devices are also increasingly being used to manage a critical and important asset for all of us: our money....
Delving Deeply Into a Bitcoin Botnet
Bitcoin is a virtual decentralized currency that was created in 2009 by developer Satoshi Nakamoto, who described the currency in...
Phishing Scam Targets Walmart.com Online Customers
Late last week, Walmart alerted the public to an email-based scam that used the company’s name (misspelled as “Wallmart”) to...
Riddle: What’s the One Password You’ll NEVER Forget?
Last week during his keynote speech at the Interop IT conference, PayPal’s Chief Information Security Officer Michael Barrett pointed to...
Bank Account Logins for Sale, Courtesy of Citadel Botnet
Financial theft is one of the most lucrative forms of cybercrime. Malware authors continue to deliver sophisticated tools and techniques...
How Do Your Digital Assets Compare?
My Dad is in his mid 60’s and retired. And the man knows how to live. A day doesn’t go...
Travnet Botnet Controls Victims With Remote Admin Tool
The malicious binary behind the Travnet botnet has been updated. The new code has a new compression algorithm, steals the...
Are you Hackable or Uncrackable? “Password Day” is Today!
Yes, such a day exists and it’s today, May 7th 2013. McAfee is working to make sure consumers increase their...
Emerging ‘Stack Pivoting’ Exploits Bypass Common Security
[This blog was primarily written by Xiaoning Li of McAfee Labs, with assistance from Peter Szor of McAfee Labs.] In...
Cybercasing – How Sharing Your Pics, Videos and Status Updates Can Get You Into Trouble
It can be fun ‘checking in’ at your favourite restaurant on Facebook, sharing pics of your hotel room on Instagram...
Visualizing A DDoS Cyber Attack
A denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated...
Tracking PDF Usage Poses a Security Problem
Update on May 2 Adobe has confirmed this vulnerability and has scheduled a patch release for May 14. Looking...
Are Google and Bing Serving You Safe Search Results?
New research has concluded that despite best efforts to keep search results clean, Google and Bing often serve malware-infected sites...
Travnet Botnet Steals Huge Amount of Sensitive Data
In a McAfee Labs blog by my colleague Vikas Taneja last month, he discussed high-level functioning in the malware Travnet....