Featured Blogs
Fighting Mobile Phone Impersonation and Surveillance
Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased...
Feeling Overwhelmed, Parents? Here’s Your Online Safety Cheat Sheet
Can we just get an extra five hours tacked onto each day so we can stay on top of our...
Father’s Day Shout Out to All Dads – Time to Wear Your Cyberdad Cape
Whenever Father’s Day is near, I find myself thinking about the role of a father in the life of his...
Father’s Day Gift Ideas: Protecting the Tech You Give to Dad
A new piece of tech often tops the list of Father’s Day gifts. And while things such as wearable fitness devices, smart...
Farewell to the SHA-1 Hash Algorithm
Rest in peace SHA-1. Like all security controls, they are valuable only for a certain time. SHA-1, a legacy hashing...
Fandango and Credit Karma Mobile Apps Put Users At Risk
A night at the movies previously meant compromising between an edge-of-your-seat thriller and that new Nora Ephron romantic comedy, with...
Family-Friendly Online Safety Tips for Summer Vacations
Summer vacations are a time for families to relax, unwind, and create lasting memories together. Whether you’re heading to the...
Family Tech: How to Save Your Vanishing Attention Span
Researchers have published a handful of studies in the past few years that examine the impact of technology on the...
Family Tech Check: 5 Ways to Help Kids Balance Tech Over Summer Break
It’s mind-blowing to think that when you become a parent, you have just 18 summers with your child before he...
Family Safety: Twitter, Instagram Beef Up Measures to Fight Hate Speech, Bullying
The past few weeks have proven to be wins for family safety with several top social networks announcing changes to...
Family Safety News: 3 Big Stories You May Have Missed
The news that produces a safer Internet for our kids is not always good but it is shaping the digital...
Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims
Alexandr Solad and Daniel Hatheway of Recorded Future are coauthors of this post. Read Recorded Future’s version of this analysis. ...
Fakecalls Android Malware Abuses Legitimate Signing Key
Authored by Dexter Shin McAfee Mobile Research Team found an Android banking trojan signed with a key used by legitimate...
Fake-Alert Scams Growing Again
Fake-alert Trojans, also known as scareware, fool consumers by claiming imaginary threats, and insisting its victims purchase a product to...
Fake WannaCry ‘Protectors’ Emerge on Google Play
Are Android devices affected by the self-propagating ransomware WannaCry? No—because this threat exploits a vulnerability in Microsoft Windows. This malware...
Fake WannaCry Protection Apps Hit the Google Play Store
WannaCry was the ransomware attack heard around the world. It impacted more than 150 countries and infected over 250,000 devices...
Fake Vertu App Infects Korean and Japanese Android Users
A new threat has surfaced targeting users in Korea and Japan, but this attack, unlike others making the news, is...
Fake Toll Road Scam Texts are Everywhere. These Cities are The Most Targeted.
Look both ways for a new form of scam that’s on the rise, especially if you live in Dallas, Atlanta,...
Fake Security App Found Abuses Japanese Payment System
Authored by SangRyol Ryu and Yukihiro Okutomi McAfee’s Mobile Research team recently analyzed new malware targeting mobile payment users in...
Fake News: What Every Parent Needs To Know
Fake news: we’ve all heard about it but what does it actually mean? Is it really a new concept or...
Fake Cleaning Apps in Google Play: an AutoRun Attack and More
Almost exactly one year ago, Google announced the addition of a “new layer to Android security,” a service codenamed Bouncer...
Fake Bahrain Government Android App Steals Personal Data Used for Financial Fraud
Authored by Dexter Shin Many government agencies provide their services online for the convenience of their citizens. Also, if this...
Fake Apps & Banking Trojans Are Cybercriminal Favorites
Today, we are all pretty reliant on our mobile technology. From texting, to voice messaging, to mobile banking, we have...
Fake AntiVirus Pop Ups, Mac Edition
I often hear Mac users say “Oh, I don’t have to worry about viruses. I have a Mac!” Well, unfortunately,...
Fake Android Update Delivers SMS, Click Fraud in Europe
McAfee Mobile Research has been monitoring a mobile malware campaign targeting users in Germany, France, and Russia since the beginning...
Fake Android and iOS apps steal SMS and contacts in South Korea
Authored by Dexter Shin Most people have smartphones these days which can be used to easily search for various topics...
Fad Diet Ads Online Open the Door for Cybercriminals
Fad diets have tempted people throughout history. At the turn of the 20th century, the Tapeworm Diet was the trend...