Featured Blogs
Are Your Kids Using Vault Apps to Hide Photos, Chats, or Videos?
A number of apps for both the Android and iPhone exist that are great for storing your personal “gems,” those...
Is the Twitter Video App ‘Vine’ Safe for Kids?
Twitter’s new video-sharing app Vine is the hottest mobile toy since Instagram—and to be honest—it’s even more fun. Still, parents...
Three Words Every Parent Needs to Know
Have you noticed that commonplace words don’t quite mean what they used to? It’s a subtle but alarming shift...
Taking Your Teen’s Phone: Know the Pros and Cons
Many parents shudder at the thought. Some even experience a shortness or breath and heart palpitations when they imagine what...
What Parents Need to Know About KIK Messenger App
We write a lot about new apps on this blog because apps are hot in the very mobile teen world....
Twitter Drama and What Parents Need to Know
With more teens flocking to social networks outside of Facebook, it’s more important than ever for parents to understand—and coach...
Have You Taught Your Kids About the Dangers of ‘Catfishing’?
You may have overheard your kids talking about “catfishing” or someone getting “catfished.” No, they aren’t talking about gills, hooks,...
Fraudulent Adult Dating Services Turn 10 Years Old, Still Evolving
McAfee Mobile Research monitors adult one-click-fraud applications on Google Play that are targeted at Japanese users. Although the attackers appeared...
Syrian Crisis Reminds Us to Beware of ‘Charity’ Scams
The dismal situation in Syria has gained considerable sympathy in the rest of the world. Unfortunately, playing on our emotions...
Obad.a – What You Need to Know About the Latest Android Threat
With the convenience of our mobile apps, we increasingly rely on our phones for work and play. But did you...
Smart Perimeter – A Security Fence For Your Digital Devices
Everyone has experienced that gut-wrenching feeling when you look around and realize that one of your prized possessions is missing. ...
Why it’s Critical to Protect Data on Digital Devices
When devices are lost or hacked and your data is exposed, not only is this a pain to deal with,...
7 Tips: How to Raise a Leader in a ‘Follower’ World
Leadership training isn’t exclusive to adults. And in today’s online culture of “following” and digital profiles, it’s never too early...
“Kik me” – The App Your Kids are Using Now: Kik
When I was young, ‘Kick Me’ was a phrase that was scrawled on a piece of notebook paper and stuck...
Mobile Malware Plays Hide and Seek
Android/Obad.A is mobile malware that has been described as very complex. Truly it is one of the most complex we’ve...
Are You Stressed Out About Passwords? Consider a Simple Option
Used correctly, passwords help keep your personal information safe, and if you’re like me, you probably have dozens (or in...
Styx Exploit Kit Takes Advantage of Vulnerabilities
Web-based malware has increased over the last few years due to an abrupt spike in new exploit kits. These kits...
McAfee Hidden Device Admin Detector – Free Protection from Android Malware
A few weeks ago, we told you about Obad, a backdoor Trojan that targets the Android operating system (OS). What...
What is Typosquatting?
Typosquatting, also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright)...
Does Kik Messenger Pose a Danger to Your Kids?
With more than 50 million users, and reportedly growing by 20,000 everyday, Kik has become one of the most popular...
Internet Browser Cookies: Not What Grandma Used To Make
Imagine you’re surfing the web in search of a new pair of shoes on Zappos.com. You browse the website, look...
What Master Key? – Android Signature Bypass Vulnerability
Recently, a vulnerability in Android package signature verification was announced by Jeff Forristal, CTO of Bluebox Security. Jeff plans on...
New Zero-Day Attack Copies Earlier Flash Exploitation
Late on July 10, Microsoft released a blog post disclosing that they were aware of a zero-day attack in the...
Adult Voice-Service Apps on Google Play Japan Charge Users Without Notice
McAfee has reported on increasing fraudulent Android applications on Google Play in Japan this year, including one-click fraud applications and...
Before You Share, Ask Yourself “Is This TMI?”
Social networks and new online services make it easy to share the details of our lives, perhaps too easily. With...
Helping Kids Understand Their ‘Digital Footprint’
It’s easy to talk in general about an important topic and apply a catchy phrase to it without our kids...
Malware Manipulates Procedure Prologue and Epilogue to Evade Security
Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers,...