Featured Blogs
Phishing Goes Mobile: New Android Malware Hits Google Play
Sometimes, things just aren’t as they seem to be. For example, last year, Google Play hosted a round of mobile...
Phishing Scam Targets Walmart.com Online Customers
Late last week, Walmart alerted the public to an email-based scam that used the company’s name (misspelled as “Wallmart”) to...
Phishing Threat Uses UTF-8 BOM in ZIP Signature to Evade Detection
This blog was written by Sanchit Karve. Last week, we noticed thousands of malware files in the wild that employ...
Phishing Android Malware Targets Taxpayers in India
Authored by ChanUng Pak McAfee’s Mobile Research team recently found a new Android malware, Elibomi, targeting taxpayers in India. The malware steals sensitive financial and private information via phishing by pretending...
Phony Adobe Flash Update Hosts Malware, Targets Apple Users
Computer maintenance is often a simple equation: avoid behavior that might land you a virus, and keep your software up-to-date....
Pickpocketing – Digital Style
Gone are the days when thieves would physically steal your wallet. Instead, they are using sophisticated techniques to steal your personal information and drain your bank accounts without you even realizing it. This article aims to shed light on digital pickpocketing, its impacts on your digital assets, and measures to ...
Picture Perfect: How to Help Your Teen Survive an ‘Instagram-Ready’ World
As the mom of a teenage girl, I have a front row seat to the good, the bad, and the...
Picture to Pedophile: The Danger of Instagram and Kik Messenger
Sometimes it might feel overwhelming to keep up with the latest social trend for your kids, but it’s important to...
Pirate Versions of Popular Apps Infiltrate Google Play via Virtualization
The McAfee Mobile Research team recently found pirated applications of popular apps distributed on the Google Play store. A pirated...
Plasma HTTP Botnet Steals Passwords From Chrome, FileZilla
Last year we reported on the Athena HTTP botnet, which targets Windows XP systems, mostly for distributed denial-of-service attacks. Now...
Play The Game – Tips and Tricks for Safe Online Gaming
This blog was written by Jessica Brookes. When I was child, gaming was all joysticks and arcades. Now, it’s all...
Plug with Caution! How to Stop Hackers from Stealing More than Battery Power
There’s nothing like that stressful moment when you look to your phone and see a red battery and a low...
Pokémon Go: How Families Can Stay Safe (and Still Catch ‘Em All)
Thanks to the new augmented reality game Pokémon Go, app fans across the globe are enjoying countless hours of fun...
Political Figures Differ Online: Names of Trump, Obama, Merkel Attached to Ransomware
Politics and ransomware. No, it’s not a lost single from the Oasis back catalogue, but in fact a relatively recent...
Popular Social Media App Timehop Hit With Huge Data Breach
The Fourth of July is characterized by barbeques, fireworks, and patriotism – and now cyberattacks! Just this past Independence Day,...
POS Malware Uses Time-Stamp Check to Evade Detection
This blog post was written by Kumaraguru Velmurugan. Point of sale (POS) attacks appear to have gained in popularity during...
Potentially Malicious Apps Your Kids May Use
It’s a question I get several times a year from anxious parents, either via a direct message, an email or even in line at the grocery store....
Pre-Installed Malware on Android Devices Expose Flaws in Supply Chain
Pencils come with erasers, books come with pages, and taxes (most of the time) come with returns. People like it...
Preventing WebCobra Malware From Slithering Onto Your System
Cryptocurrency mining is the way transactions are verified and added to the public ledger, a database of all the transactions...
Price Book Changes for 2014
Our Price Books have been complicated and difficult to use. So as part of our continuing effort to be easier...
Prioritizing Security in a Remote Learning Environment
Prioritizing Security in a Remote Learning Environment Learning environments are not what they used to be, and as educational institutions...
Privacy Awareness Week 2017: It’s Time To Talk More To Your Kids
Attention, parents with kids between 8 and 17! Here’s a statistic that is probably going to make you squirm –...
Privacy Awareness Week 2019 – Protect Your Online Privacy
If you haven’t given your online privacy much attention lately then things need to change. In our era of weekly...
Privacy Awareness Week-Are We Responsible for Our Data Breach?
“The best match for me,” announced my daughter one Sunday morning sometime back, “is a Scorpio.” “Oh really? And this...
Privacy in Practice: Securing Your Data in 2021 and Beyond
Technological advancements continually emerge that make our lives easier. Right? As beneficial and convenient as emerging tech is, it can...
Privacy in Practice: Securing Your Data in 2023 and Beyond
Every year we can count on new technology to make our lives easier. Right? As beneficial and convenient as tech...
Privacy, Identity, and Device Protection: Why You Need to Invest in All Three
Protecting your devices with antivirus is a great start, yet it’s only one part of staying safer online. With the...
