Featured Blogs
Analyzing the Target Point-of-Sale Malware
January 21, 2014: As more information comes to light, surrounding these events, we continue to identify and analyze additional components...
One-Click Scammers Still Targeting Japanese Smartphone Users
Last year we saw an attack targeting Android device users in which more than 2,400 malicious one-click fraud apps were...
5 Destructive Digital Habits You Could Be Teaching Your Kids
One of the coolest things about being a parent is being convinced your child hasn’t heard a word you’ve said...
Trojan Hides in ROM of Chinese Android Devices
In China, some mobile phone geeks like to refresh their Android machines with images from the Internet. For some mobile...
Why Your Kids Can’t Join Facebook Until They Are 13
Have you ever wondered why it is that your kids can’t join social media sites like Facebook until they are...
You’ve Got Mail — But it Might be a ‘Spoof’
As Internet users everywhere are on heightened alert following the discovery of the password-compromising Heartbleed bug earlier this month, it...
USB Drives – With Convenience Comes Risk
I’m sure most of us have used a USB drive (or thumb drive) at one point or another. They are...
The Privacy Problems with Mobile Messaging Apps
When you chat with someone through a third-party messaging app, be aware that someone may read it—someone other than your...
CryptoWall Ransomware Built With RC4 Bricks
Last month many Internet users were suddenly forced to trade in Bitcoins. This was not for general purposes–they were paying...
The Internet of Things Needs a Standard. There’s a Consortium for That
Let’s talk about networks. A network can imply a number of things: it can imply a group of friends, coworkers...
Malicious Utility Can Defeat Windows PatchGuard
In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at...
Android App SandroRAT Targets Polish Banking Users via Phishing Email
Europe is currently under attack by spammers trying to get control of Android devices. In Germany the distribution method is...
7 Creative Ways to Get Your Teen Talking
“Yeah.” “No.” “Nothing.” “Good.” “Okay.” “Whatever.” Do you recognize that notorious bit of prose? It’s the six-word vocabulary list teens...
Nude Celebrity Photo Dump Has Many Asking What Happened
Hundreds of private photos belonging to several high-profile Hollywood actresses were posted online this past weekend. They are explicit in...
The Hacker’s New Best Friend Could be Your USB Port
It’s tiny and portable, yet perfect for storing large items. I’m talking about the good ol’ Universal Serial Bus (a.k.a...
Is This Your Photo? No, It’s SMS Spam With Mobile Malware
One of the most important concerns of Internet users is privacy. For this reason one of the most effective phishing...
How Hackers Use Popular Shows to Infect Your Devices
If there’s one reasonable measurement of how popular a television series has become, it’s how often it’s illegally downloaded online....
Apps Sending Plain HTTP Put Personal Data at Risk
At the AVAR Conference in November 2014, McAfee Labs presented how to exploit a cross-site scripting vulnerability of the Costco...