Featured Blogs
Nude Celebrity Photo Dump Has Many Asking What Happened
Hundreds of private photos belonging to several high-profile Hollywood actresses were posted online this past weekend. They are explicit in...
The Hacker’s New Best Friend Could be Your USB Port
It’s tiny and portable, yet perfect for storing large items. I’m talking about the good ol’ Universal Serial Bus (a.k.a...
Is This Your Photo? No, It’s SMS Spam With Mobile Malware
One of the most important concerns of Internet users is privacy. For this reason one of the most effective phishing...
How Hackers Use Popular Shows to Infect Your Devices
If there’s one reasonable measurement of how popular a television series has become, it’s how often it’s illegally downloaded online....
Apps Sending Plain HTTP Put Personal Data at Risk
At the AVAR Conference in November 2014, McAfee Labs presented how to exploit a cross-site scripting vulnerability of the Costco...
Teslacrypt Joins Ransomware Field
A newly crafted ransomware, Teslacrypt, has arrived in the malware genre that encrypts user files using AES encryption and demands...
What is a Virus?
Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses,...
5 Questions to Ask Before Your Kids Download that App
We now spend a staggering 86% of our mobile time on apps, according to the latest stats. Downloading apps and...
Malware Spreads Through Facebook Tag Scam
McAfee has recently observed a malware spreading through Facebook. This type of malware is not new, but it keeps evolving...
