Featured Blogs
What is Malware?
What is malware? A dictionary-like definition is “malicious software that attacks computers, smartphones, and other connected devices.” In fact, “malware”...
Mobile NFC Features Raise Security Concerns
Yesterday, at the Web 2.0 Summit, Google’s CEO Eric Schmidt presented the Nexus S. This wasn’t just about a new...
Android Malware Spreads Through QR Code
Last week, there was quite a buzz in the mobile-malware researchers community about a new Android malware. It came to...
Networked Printers at Risk
Multifunction printers (MFPs) have been common in offices for years. They let employees print, scan, and copy documents. Two separate talks...
2012 Online Safety Survey – Majority Of Americans Do Not Feel Completely Safe Online
From tweens and teens to silver surfers, more people are jumping onto multiple Internet connected devices every day. It’s very...
‘FakeInstaller’ Leads the Attack on Android Phones
Android.FakeInstaller is a widespread mobile malware family. It has spoofed the Olympic Games Results App, Skype, Flash Player, Opera and...
10 Tips to Safe Online Shopping
How times have changed. I can remember when Christmas didn’t start until after Thanksgiving—not before Halloween as we see things...
App Lock: The Security System for Unprotected Mobile Apps
Lock: To fasten, to make secure, to confine or exclude by. To fix in place so that movement or escape...
Red Kit an Emerging Exploit Pack
Exploit kits are toolkits that are used to build malware components such as binaries and scripts. They automate the exploitation...
Are you Hackable or Uncrackable? “Password Day” is Today!
Yes, such a day exists and it’s today, May 7th 2013. McAfee is working to make sure consumers increase their...
How Do Your Digital Assets Compare?
My Dad is in his mid 60’s and retired. And the man knows how to live. A day doesn’t go...
To Skype or Not to Skype: What Parents Need to Know About Video Chat
Captain Kirk isn’t the only one who gets to video chat these days. If your kids have a smart phone...
A Snapshot: How to Keep Your Kids Safe on Instagram
“Mom, how do you block people on Instagram? I can’t figure it out,” yelled 13-year old Chloe casually from the...
Taking Your Teen’s Phone: Know the Pros and Cons
Many parents shudder at the thought. Some even experience a shortness or breath and heart palpitations when they imagine what...
What is Typosquatting?
Typosquatting, also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright)...
The Dilemma of Anonymity and Dangers of Ask.fm
Anonymity affords a precarious, irresistible power to teens online. Ask.fm is one app that’s exploding in popularity by allowing users...
7 Things Parents Need to Know About the Voxer Voice App
Every five minutes, it seems, a new app comes out but only a handful stick with tweens and teens looking...
LG Smart TVs Leak Data Without Permission
Deals abound on gadgets and gizmos in the wintry weeks before Christmas, but could that shiny new toy on your...
Analyzing the Target Point-of-Sale Malware
January 21, 2014: As more information comes to light, surrounding these events, we continue to identify and analyze additional components...
One-Click Scammers Still Targeting Japanese Smartphone Users
Last year we saw an attack targeting Android device users in which more than 2,400 malicious one-click fraud apps were...
5 Destructive Digital Habits You Could Be Teaching Your Kids
One of the coolest things about being a parent is being convinced your child hasn’t heard a word you’ve said...
Trojan Hides in ROM of Chinese Android Devices
In China, some mobile phone geeks like to refresh their Android machines with images from the Internet. For some mobile...
Why Your Kids Can’t Join Facebook Until They Are 13
Have you ever wondered why it is that your kids can’t join social media sites like Facebook until they are...
You’ve Got Mail — But it Might be a ‘Spoof’
As Internet users everywhere are on heightened alert following the discovery of the password-compromising Heartbleed bug earlier this month, it...
USB Drives – With Convenience Comes Risk
I’m sure most of us have used a USB drive (or thumb drive) at one point or another. They are...
The Privacy Problems with Mobile Messaging Apps
When you chat with someone through a third-party messaging app, be aware that someone may read it—someone other than your...
CryptoWall Ransomware Built With RC4 Bricks
Last month many Internet users were suddenly forced to trade in Bitcoins. This was not for general purposes–they were paying...