Featured Blogs
Are You Stressed Out About Passwords? Consider a Simple Option
Used correctly, passwords help keep your personal information safe, and if you’re like me, you probably have dozens (or in...
Styx Exploit Kit Takes Advantage of Vulnerabilities
Web-based malware has increased over the last few years due to an abrupt spike in new exploit kits. These kits...
McAfee Hidden Device Admin Detector – Free Protection from Android Malware
A few weeks ago, we told you about Obad, a backdoor Trojan that targets the Android operating system (OS). What...
What is Typosquatting?
Typosquatting, also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright)...
Does Kik Messenger Pose a Danger to Your Kids?
With more than 50 million users, and reportedly growing by 20,000 everyday, Kik has become one of the most popular...
Internet Browser Cookies: Not What Grandma Used To Make
Imagine you’re surfing the web in search of a new pair of shoes on Zappos.com. You browse the website, look...
What Master Key? – Android Signature Bypass Vulnerability
Recently, a vulnerability in Android package signature verification was announced by Jeff Forristal, CTO of Bluebox Security. Jeff plans on...
New Zero-Day Attack Copies Earlier Flash Exploitation
Late on July 10, Microsoft released a blog post disclosing that they were aware of a zero-day attack in the...
Adult Voice-Service Apps on Google Play Japan Charge Users Without Notice
McAfee has reported on increasing fraudulent Android applications on Google Play in Japan this year, including one-click fraud applications and...
