Search Results

Mobile and IoT Security

Don’t Believe These 6 Mobile Security Myths

Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don’t think it applies ...

Consumer Threat Notices

Mobile Spyware: How Hackers Can Turn Your Phone Into a Stalking Machine

In the mid-2000s a commercial advertisement achieved so much notoriety that its existence bordered on parody. The product was a headache-relieving cream called HeadOn and its advertisements told you three times to “apply it directly to the forehead.” The commercial was widely panned for its bizarre nature and lack of ...

Identity Protection

What is Browser Hijacking?

Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed  or check out The Financial Times but your homepage is now some weird search engine you’ve never seen before. Guess what? You’ve been hijacked. Browser hijacking is when your Internet browser (eg. Chrome, FireFox, ...

Enterprise

Verizon DBIR: Noise & Attack Patterns Mapped to 20 Critical Controls

This blog was written by Barbara Kay. In our Security Connected discussions, security leaders routinely ask “Where do I invest for results? How do I communicate the risk reduction impact of security investments to the Board?” Now there’s practical assistance on which controls count and why: guidance based on attack ...

Mobile and IoT Security

Smartphone Kill Switch Could Become Federal Law

There is no doubt that mobile devices are an integral part of our daily lives, making their potential loss all the more detrimental. Aside from using smartphones to communicate with friends and family, find restaurants, and check email, they serve as repositories for more and more sensitive, personal information. The ...

Consumer Threat Notices

Netflix Phishing Scam Lures Users Into Calling Fake Tech Support

A group of scammers seem to have taken to heart the lesson bequeathed to us by Three Dog Night in the summer of ’69: that yes, one is the loneliest number. This newly unleashed attack uses not one but multiple tactics to dupe unsuspecting victims by pairing a phishing attack—where ...

Family Safety

Cyber Pranks – Funny or Mean??

We all know that kids love to play pranks – it is just part of childhood. Whether it is whoopee cushions, switching the salt and the sugar or good old plastic spiders, harmless pranks can be fun and actually a good way of teaching kids resilience. But unfortunately, when kids ...

Consumer Threat Notices

Six Easy Steps to Help Keep Hackers at Bay

Cybercriminals are adopting complex and powerful techniques to “hack,” or take control of online accounts belonging to other people or organizations. Often, they do this by identifying the passwords belonging to an account user. This used to be a complicated task, but, as The Atlantic notes, discovering passwords today can ...

McAfee Labs

Android Malware Promises Video While Stealing Contacts

Recently we discovered a new Android Trojan in the official Google Play market that displays a video downloaded from the Internet–but only if some sensitive information is previously sent to a remote server. The malicious applications are designed for Japanese users and display “trailers” of upcoming video games for Android. ...

Enterprise

10 Things You Don’t Want To Know About Bitlocker

An update to this post was written by Ted Pan:  With Release of Windows 10, Questions About BitLocker Arise Again With the forthcoming release of Windows 7, questions about “Bitlocker” are coming up again. For those of you who were around during the original release of Bitlocker, or as it ...

Subscribe to McAfee Securing Tomorrow Blogs