Featured Blogs
Cheating and Bullying: It’s a Bigger Problem than You Think!
The whole purpose of your “youth” is to grow and learn. It’s time to take in lots of information, so...
Japanese One-Click Scammers Abuse Mobile Traffic Exchange Service
McAfee has been monitoring and reporting extensively on one-click-fraud malware for Android in Japan this year. These attacks, primarily on...
Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code
Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware...
Java Back Door Acts as Bot
The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found...
Android App Contains Windows Worm
When developers are unaware of security they open the door to threats against their customers and users. We are not...
The Dilemma of Anonymity and Dangers of Ask.fm
Anonymity affords a precarious, irresistible power to teens online. Ask.fm is one app that’s exploding in popularity by allowing users...
Spy? Where? Mobile Spyware Hiding Right Under Your Nose
Some days it feels like the whole world is going mobile. We tweet, we text, we browse the world from...
What Are the Risks of Geo-Location?
Using your mobile’s built-in global positioning system (GPS) functionality allows location-based services (or geo-location) to locate and publish information about...
BYOD: Balancing Convenience and Security
It lies next to you as you sleep, comes with you to work, rides home with you in your car...
