Featured Blogs
What to Do If Your Email Is Hacked
I think I could count on my hand the people I know who have NOT had their email hacked. Maybe...
Zeus Crimeware Toolkit
The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This...
AutoIt and Malware: What’s the Connection?
During the last couple of weeks I’ve come across three malware samples packed using compiled AutoIt scripts, so I decided...
Android Phones Vulnerable to Loss of Data, Apps
Recently security researcher Ravi Borgaonkar discussed a vulnerability that caused a Samsung Galaxy SIII to return to a factory reset...
What is a Keylogger?
Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every...
New Free Version of McAfee Mobile Security
At CES, last month in Las Vegas, McAfee announced plans to offer elements of McAfee® Mobile Security for free. Since...
Yik Yak & Omegle: Two Apps Kids Need to Delete ASAP
So I’ve been trying to put myself in the shoes of people who can’t seem to get enough of using...
Suspicious Mobile App Finds Your Gmail, Facebook, and Twitter Accounts
Today many people use multiple web services, such as social networking and messaging services. Some users explicitly show their identity...
RTF Attack Takes Advantage of Multiple Exploits
This is a joint analysis by Haifei Li, Stanley Zhu, and Jun Xie of McAfee Labs Recently, the rich text...