Featured Blogs
What to Do If Your Email Is Hacked
Email hacking is more common than you think. If you find yourself a victim of email hacking here are a few important steps you need to take.
Zeus Crimeware Toolkit
The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This...
AutoIt and Malware: What’s the Connection?
During the last couple of weeks I’ve come across three malware samples packed using compiled AutoIt scripts, so I decided...
What is a Keylogger?
Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every...
Yik Yak & Omegle: Two Apps Kids Need to Delete ASAP
So I’ve been trying to put myself in the shoes of people who can’t seem to get enough of using...
Suspicious Mobile App Finds Your Gmail, Facebook, and Twitter Accounts
Today many people use multiple web services, such as social networking and messaging services. Some users explicitly show their identity...
RTF Attack Takes Advantage of Multiple Exploits
This is a joint analysis by Haifei Li, Stanley Zhu, and Jun Xie of McAfee Labs Recently, the rich text...
What Mobile Users Should Know About Heartbleed: Free McAfee Android App
By now, you have probably heard about the Heartbleed bug, estimated to affect up to two-thirds of all websites using...
What Should the Consequences Be for a Teens’ Digital Slip-Up?
Usually the first question I get from panicked parents who just found something shocking on their child’s phone is, “what...
