Featured Blogs
What to Do If Your Email Is Hacked
I think I could count on my hand the people I know who have NOT had their email hacked. Maybe...
Zeus Crimeware Toolkit
The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This...
AutoIt and Malware: What’s the Connection?
During the last couple of weeks I’ve come across three malware samples packed using compiled AutoIt scripts, so I decided...
Android Phones Vulnerable to Loss of Data, Apps
Recently security researcher Ravi Borgaonkar discussed a vulnerability that caused a Samsung Galaxy SIII to return to a factory reset...
What is a Keylogger?
Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every...
New Free Version of McAfee Mobile Security
At CES, last month in Las Vegas, McAfee announced plans to offer elements of McAfee® Mobile Security for free. Since...
Yik Yak & Omegle: Two Apps Kids Need to Delete ASAP
So I’ve been trying to put myself in the shoes of people who can’t seem to get enough of using...
Suspicious Mobile App Finds Your Gmail, Facebook, and Twitter Accounts
Today many people use multiple web services, such as social networking and messaging services. Some users explicitly show their identity...
RTF Attack Takes Advantage of Multiple Exploits
This is a joint analysis by Haifei Li, Stanley Zhu, and Jun Xie of McAfee Labs Recently, the rich text...
What Mobile Users Should Know About Heartbleed: Free McAfee Android App
By now, you have probably heard about the Heartbleed bug, estimated to affect up to two-thirds of all websites using...
What Should the Consequences Be for a Teens’ Digital Slip-Up?
Usually the first question I get from panicked parents who just found something shocking on their child’s phone is, “what...
Stay Connected Safely When Using Free Wi-Fi in Public Areas
I am just back from my summer hols, and feeling absolutely refreshed! Holidays are so necessary to recharge you and...
40 Phrases Every Child Needs to Hear
With school back in full swing our house has transitioned almost instantly from long, fun summer days to tighter schedules,...
What Is a Trojan Horse?
One of history’s great literary classics is Homer’s Iliad, which tells the story of the Trojan horse—the wooden horse that...
New Year, New Partner Learning Center
This blog post was written by Allison Clarke. Thinking Big In 2015 we are “Thinking Big” and nothing demonstrates this...
What is a Remote Administration Tool (RAT)?
Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I...
How to Remove Unwanted Photos of Your Child Online
There’s a chance you may skip this blog post thinking to yourself: This will never happen to my child. I have a...
McAfee Mobile Security 4.5 for Android is here!
McAfee just launched the latest version of our award-winning Android app–McAfee Mobile Security (MMS). MMS has evolved beyond providing AV...