Featured Blogs
The Internet of Things Needs a Standard. There’s a Consortium for That
Let’s talk about networks. A network can imply a number of things: it can imply a group of friends, coworkers...
Malicious Utility Can Defeat Windows PatchGuard
In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at...
Android App SandroRAT Targets Polish Banking Users via Phishing Email
Europe is currently under attack by spammers trying to get control of Android devices. In Germany the distribution method is...
7 Creative Ways to Get Your Teen Talking
“Yeah.” “No.” “Nothing.” “Good.” “Okay.” “Whatever.” Do you recognize that notorious bit of prose? It’s the six-word vocabulary list teens...
Nude Celebrity Photo Dump Has Many Asking What Happened
Hundreds of private photos belonging to several high-profile Hollywood actresses were posted online this past weekend. They are explicit in...
The Hacker’s New Best Friend Could be Your USB Port
It’s tiny and portable, yet perfect for storing large items. I’m talking about the good ol’ Universal Serial Bus (a.k.a...
Is This Your Photo? No, It’s SMS Spam With Mobile Malware
One of the most important concerns of Internet users is privacy. For this reason one of the most effective phishing...
How Hackers Use Popular Shows to Infect Your Devices
If there’s one reasonable measurement of how popular a television series has become, it’s how often it’s illegally downloaded online....
Apps Sending Plain HTTP Put Personal Data at Risk
At the AVAR Conference in November 2014, McAfee Labs presented how to exploit a cross-site scripting vulnerability of the Costco...
Teslacrypt Joins Ransomware Field
A newly crafted ransomware, Teslacrypt, has arrived in the malware genre that encrypts user files using AES encryption and demands...
What is a Virus?
Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses,...
5 Questions to Ask Before Your Kids Download that App
We now spend a staggering 86% of our mobile time on apps, according to the latest stats. Downloading apps and...
Malware Spreads Through Facebook Tag Scam
McAfee has recently observed a malware spreading through Facebook. This type of malware is not new, but it keeps evolving...
Meet ‘Tox’: Ransomware for the Rest of Us
The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover...
When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign
Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets. The Flowchart...
Threat Actors Use Encrypted Office Binary Format to Evade Detection
This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...
Don’t Rely on the Password Reset
Think about your keychain. It probably holds the necessities: car keys, home keys, work keys, miscellaneous keychains you bought on...
Mr. Robot Gets Hacking Right. Here’s How
If you have an interest in cybersecurity and popular culture, do yourself a favor now: go watch Mr. Robot, USA...
Your mobile apps could be spying on you and telling secrets!
I am sharing this article, written by Shelly Tzoumas – Thanks, Shelly! How close are relentless cyber criminals to hacking...
Sad but True: Asking for Nudes is Norm for Teens
“Seriously?” my teen daughter shrieked. “What a jerk!” With a few angry finger jabs to her home screen she shut...
AshleyMadison Hack Demonstrates Power of Scam Artists
This blog post was written by Armando Rodriguez. Last month, cybersecurity journalist Brian Krebs broke the news that adult site...
How to Stop Sharing Your Location Information
The Internet helps us connect and share with people around the world, but there are some people with whom you...
Live Streaming – The Good, The Bad & The Ugly
Listen up parents: live streaming is the latest trend that you need to get your heads around. Not only are...
What Families Can Learn from the #HisNameIsCayden Hashtag
A recent Facebook post that went viral cost an Atlanta man his job and opened an important conversation for families around...
Another Day, Another Smart Toy Hack: This Time, It’s Fisher-Price
Toys offer a unique insight into a time, place and culture that has come and gone. While the Romans had...
Phony Adobe Flash Update Hosts Malware, Targets Apple Users
Computer maintenance is often a simple equation: avoid behavior that might land you a virus, and keep your software up-to-date....
A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress
More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss...