Featured Blogs
Remote iPhone Jailbreak Using PDF Exploit Should Serve as Wake-Up Call
Like many iPhone users, I “jailbreak” my iPhone. I do this for many reasons, but mainly for console-level access and...
Are Your Kids Using Vault Apps to Hide Photos, Chats, or Videos?
A number of apps for both the Android and iPhone exist that are great for storing your personal “gems,” those...
Obad.a – What You Need to Know About the Latest Android Threat
With the convenience of our mobile apps, we increasingly rely on our phones for work and play. But did you...
Product Coverage and Mitigation for CVE-2014-1761 (Microsoft Word)
On March 24, Microsoft released Security Advisory 2953095 for Microsoft Word. In-the-wild exploitation of this vulnerability has been observed across...
Product Coverage and Mitigation for CVE-2014-1776 (Microsoft Internet Explorer)
On April 26, Microsoft released Security Advisory 2963983 for Microsoft Internet Explorer. In-the-wild exploitation of this vulnerability has been observed...
How to Spot and Protect Yourself from Fake Antivirus Software
Most of you know how important it is to have security software on your computers to stay protected from viruses, malware,...
Teen Hashtags: What Every Parent Ought to Know
Hashtags have become a normal part of everyday vernacular thanks to social media. By simply putting a pound (#) sign...
Beware of Impostor Android Apps Using Fake ID
Recently discovered, an Android vulnerability called Fake ID allows apps to impersonate other apps by copying their identity. Each app...
At McAfee, Protecting Customers Takes Precedence Over Seeking Headlines
One question I often hear is “When will McAfee publish a report on the latest threat?” It seems to be...