Featured Blogs
More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked
In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else. Everyone else is...
More Japanese Chat Apps on Google Play Steal Phone Numbers
In two recent blogs, McAfee Labs described Japanese and Korean Android apps on Google Play that steal a mobile device’s...
More Details on "Operation Aurora"
Earlier today, George Kurtz posted an entry, ‘Operation “Aurora” Hit Google, Others’,  on the McAfee’s Security Insight blog The purpose...
More Dangers of Cyberbullying Emerge—Our Latest Connected Family Report
Earlier this year, our global Connected Family Study revealed the online habits of parents and their children. What we found...
More Capable IoT Botnets to Emerge as the ‘Pros’ Enter the Fray
On the heels of severe distributed denial of service (DDoS) attacks, we see new botnets emerging that are powered by...
More Apps for Younger Users Emerging. Here’s What Parents Need to Know.
More and more social platforms are coming up with safer ways for younger kids to access their apps. The most...
MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play
The McAfee mobile research team has found a new type of Android malware for the MoqHao phishing campaign (a.k.a. XLoader...
MoqHao evolution: New variants start automatically right after installation
Authored by Dexter Shin MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first...
Moore’s Law and Security
In case you haven’t noticed, you owe Moore’s Law a belated birthday card. The famed theorem, which set the technology...
Model Hacking ADAS to Pave Safer Roads for Autonomous Vehicles
The last several years have been fascinating for those of us who have been eagerly observing the steady move towards...
Mobile World Congress: The Evolution of Mobile Security Through the Years
As I prep for Mobile World Congress, I’ve done some reflecting on my very first cell phone. Whether it was...
Mobile Threats Report: What’s on the Horizon for 2016
This blog post was written by Bruce Snell. With Mobile World Congress in full swing, we thought it would be...
Mobile Spyware—How You Can Keep Stalkers Off Your Phone
When you wind up with mobile spyware, you may wind up with a stalker on your phone. In its most...
Mobile Spyware: How Hackers Can Turn Your Phone Into a Stalking Machine
Some crooks and shady characters will invade your privacy simply by asking for your permission to snoop—through invasive apps you...
Mobile Shopping on Social Media: The New Frontier
Let’s go back in time. Here’s the scenario: You’re hosting a party and the party prep includes a trip to...
Mobile Pop-Ups, Digital Spam with a Side of Dangerous
Technology has become the personal assistant of our dreams, but also the crutch for our brains that we’ve grown increasingly...
Mobile Phone Etiquette
Nothing irritates me more than someone using their phone while talking to me – and it’s not because I think...
Mobile NFC Features Raise Security Concerns
Yesterday, at the Web 2.0 Summit, Google’s CEO Eric Schmidt presented the Nexus S. This wasn’t just about a new...
Mobile Messaging And Kids: How Aware Are Parents?
Messaging apps are the in thing today. Right from a collegian to the 40-something mother of two; from the local...
Mobile Malware, Phishing and Ransomware — Oh My!
So far, 2014 has been a tumultuous year for the security industry. We’ve seen thousands of computers taken hostage through...
Mobile Malware Plays Hide and Seek
Android/Obad.A is mobile malware that has been described as very complex. Truly it is one of the most complex we’ve...
Mobile Malware in 2014
As the world becomes increasingly mobile, criminals are prioritizing their scams to target smartphone and tablets users more than ever...
Mobile Flirting App “Skout” Was Used In 3 Rape Cases
3 minors and 3 men are the center of attention regarding 3 rape cases, the catch? A mobile flirting app...
Mobile Bankers Beware: A New Phishing Scam Wants Your Money
As a growing number of smartphone owners get increasingly comfortable using their mobile devices for everything from shopping online to...
Mobile Authentication vs. Mobile Banking and Commerce, Part II
Mobile authentication grants access to online banking – but it’s not exactly mobile banking. The main difference is that mobile...
Mobile Attacks: The Golden Age for Hackers
It’s fun to re-watch shows like “Friends” and realize that so many plot lines are irrelevant today because of technology...
Mobile and Phishing – Why It’s More Dangerous
Phishing occurs when scammers send emails that appear to have been sent by legitimate, trusted organizations in order to lure...