Featured Blogs
Smartphones in Classrooms: is it Time for a Rethink?
In 2017, you’d be hard pressed to find many teens heading off to school WITHOUT a smartphone in their pockets....
SMBGhost – Analysis of CVE-2020-0796
The Vulnerability The latest vulnerability in SMBv3 is a “wormable” vulnerability given its potential ability to replicate or spread over...
Smishing Campaign Steals Banking Credentials in U.S.
The McAfee Mobile Research team recently found an active smishing campaign, using SMS messages, that targets online banking users in...
SMS Phishing Campaign Spreads in China
Phishing messages and fake websites for stealing users’ credentials are a common occurrence. Recently, however, mobile banking users in China...
Snap Map: What Parents Need To Know Now
Just when we were finally getting our heads around Snapchat, now the world’s most popular photo messaging app has added...
Snapchat Hacked: 4.6M Phone Numbers Leaked
Snapchat is, undeniably, one of the great tech success stories of 2013. The photo sharing app, known for it’s deletion...
SnapChat-Like Apps Hide Content on Twitter, Facebook
Just when parents figured out SnapChat, an app that makes photo texts disappear, two new apps hit the social scene that...
SnapHack: Hacking for the Greater Good?
Most hacks and attacks introduced on this blog are blatantly malicious, looking to nab your valuable information. However, this may...
Snapstreaks: Why Kids Keep them Going and What Parents Need to Know
People who use the popular social networking app Snapchat, understand what happens after three consecutive days of messaging the same...
So Are You ‘Hot or Not?’ App Rates Appearance
First, let me begin with the fact that I love apps. In fact, I am probably addicted to them. I...
So You Think Your Phone Is Hacked—Here’s What to Do
Humans are private by nature. We may share an inspiring article or photos from a fun trip, but we keep...
So, Your Child Wants A Smartwatch for Christmas? Here’s What You Need to Know
My youngest son is a Smartwatch fanatic. At the age of 14, he’s already ‘progressed’ through much-loved Pebble and Sony...
So, Your Kids Have Left School. Do You Still Need To Worry About Their Online Safety?
Last week, I waved my 18-year-old off as he embarked on the Aussie school leaver’s rite of passage – Schoolies!!...
So, Your Phone Got Stolen. Here’s What to Do.
The Coachella Music and Arts Festival is known for 3 days of desert heat, trendy tunes, and breathtaking art installations,...
Social Engineering: Tis the Season for Tricky Hackers
With the holidays on the horizon, spirits are high—and it’s those same high spirits that hackers want to exploit. ‘Tis the...
Social Engineering—The Scammer’s Secret Weapon
Social engineering. It’s a con game. And a con game by any other name stings just as badly. Like any...
Social Media Harassment is a Real Threat. Here’s How to Protect Yourself.
It is an almost undisputable truth that access to a cloak of anonymity and a large, large microphone brings the...
Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing!
An Indian investigative portal Cobrapost, recently released a report on alleged online reputation smearing/management/campaigns designed to gain/destroy political capital for who ever was...
Social Media Swamped by Social Botnets
As anyone with a newsfeed will tell you, fake social media accounts have been on the rise in recent years....
Social Media: How to Steer Your Family Clear of Cryptomining Malware
It’s fun to jump on our favorite social media sites such as Facebook, Instagram, or LinkedIn and know we can...
Social Media: Where Cybercrime Lurks in the Shadows
When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark...
Social Network Account Stealers Hidden in Android Gaming Hacking Tool
Authored by: Wenfeng Yu McAfee Mobile Research team recently discovered a new piece of malware that specifically steals Google, Facebook,...
Social Security Numbers Easily Cracked
It is easier than ever to guess or predict an individual’s Social Security number, which puts us all at a...
Social Underground: Kids Using Google Docs as New Digital Hangout
Over the years kids have succeeded in staying one step ahead of parents on the digital front. Remember the golden...
Software Company WakeNet AB Discovered Spreading PUPs to Users
Pay-per-install, or PPI for short, is a type of software program that presents users with third-party offers while they are...
Solving the Gamer’s Dilemma: Security vs. Performance
As of last year, 2.2 billion1 people consider themselves gamers across the globe. Of that 2.2 billion, over 50% – 1.22...
Solving the Mystery of the Office Zero-Day Exploit and DEP
On November 5 McAfee Labs blogged about a Microsoft Office zero-day attack that we spotted in the wild. In another...
