Featured Blogs
Getting Down With The Kids – Internet Slang for Dummies!
Whenever my boys come home with a new buzz word or saying, I instantly feel like a dinosaur. Whether it...
Internet Safety Resolutions for 2013
My daughter loves forming New Year resolutions! Every January 01, she diligently pens down her resolutions (always interesting ones!) on...
Is Your SNS Addiction Getting Out of Hand? – All Names Aren’t Cool
The news that went viral on social networking sites last week made me smile and shake my head and say,...
Red Kit an Emerging Exploit Pack
Exploit kits are toolkits that are used to build malware components such as binaries and scripts. They automate the exploitation...
If You Deploy Only Antivirus, It Will Cost You More and Make You Less Secure
Everyone’s looking to shave their IT budgets, manage fewer vendors and streamline. The plethora of low cost and sometimes free...
YouTube Video Scam Targets Facebook Users
Be advised cybercriminals are at it again, leveraging the popularity of Facebook and YouTube to scam consumers.We have seen several...
A Look Back: Top 5 Security Trends of 2012
As we look back on 2012, it’s impossible not to recall the many high-profile breaches and cybersecurity incidents that took...
W32/Autorun Worm: A Nasty Bug for Your Computer
What do you think of when you hear the word “malware”? Most people think of the general term “virus”–something that...
New Labs Report: ‘Analyzing Project Blitzkrieg’
Project Blitzkrieg, a current attack on US financial institutions, got a lot of media attention following a blog posting by...
Secret Lives of Indian Teens- A McAfee Survey
“So where’s your daughter?” “Oh, she is in her room, on the net,” replied the indulgent Mother. “These kids have...
App Lock: The Security System for Unprotected Mobile Apps
Lock: To fasten, to make secure, to confine or exclude by. To fix in place so that movement or escape...
Hackers Gone Hipster: Are Tumblr and Instagram Users Still at Risk?
Two newsworthy vulnerabilities hit the stands this week, both of particular interest to many of our at-home users. Monday morning,...
Narilam Trojan Targets Iranian Financial Software
Iranian infrastructure has been on the radar of cyberattackers for a couple of years. We have already witnessed organized and...
10 Tips to Safe Online Shopping
How times have changed. I can remember when Christmas didn’t start until after Thanksgiving—not before Halloween as we see things...
The Top 12 Scams Of Christmas To Watch Out For
McAfee Latest 2012 Holiday-Related Online Scams and Security Tips for Consumers The holidays are just around the corner and amid...
Hack the Vote: Pros and Cons of Electronic Voting
After 17 months and billions in campaign spending, it was up to the scores of American people who flooded churches,...
Actress Sofia Vergara’s Personal Photos Hacked or Stolen Via Mobile
In my line of work I get emails such as this one: “Hi Robert, I’m not sure if you saw...
A Quick Analysis of the Flash Player Opcode-Verifying Code Execution Vulnerability
On October 12, McAfee Labs learned of proof-of-concept code exploiting a newly patched Flash Player vulnerability. Adobe had patched this...