Featured Blogs
Don’t Take a Bite out of that Apple Gift Card Scam
Good rule of thumb on the web: When it seems too good to be true, it probably is. Those ads...
BYOD: Balancing Convenience and Security
It lies next to you as you sleep, comes with you to work, rides home with you in your car...
What Are the Risks of Geo-Location?
Using your mobile’s built-in global positioning system (GPS) functionality allows location-based services (or geo-location) to locate and publish information about...
Spy? Where? Mobile Spyware Hiding Right Under Your Nose
Some days it feels like the whole world is going mobile. We tweet, we text, we browse the world from...
The Dilemma of Anonymity and Dangers of Ask.fm
Anonymity affords a precarious, irresistible power to teens online. Ask.fm is one app that’s exploding in popularity by allowing users...
Android App Contains Windows Worm
When developers are unaware of security they open the door to threats against their customers and users. We are not...
Java Back Door Acts as Bot
The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found...
Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code
Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware...
Japanese One-Click Scammers Abuse Mobile Traffic Exchange Service
McAfee has been monitoring and reporting extensively on one-click-fraud malware for Android in Japan this year. These attacks, primarily on...
Cheating and Bullying: It’s a Bigger Problem than You Think!
The whole purpose of your “youth” is to grow and learn. It’s time to take in lots of information, so...
Introducing App Reputation for Android Apps
McAfee has always been in the forefront of finding new ways to secure our customers against threats and risks posed...
5 (Kind) Reminders for Overly Nosy Parents
Last night I sat next to my teenage son as he played video games. It did not take long before...
Android Master-Key Malware Already Blocked by McAfee Mobile Security
The Android Master Key vulnerability, which was first reported by BlueBox Security, has been big news this month. McAfee explained...
Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors
Nothing in life is free, and that’s especially true when it comes to mobile apps. Thousands of free apps are...
Q&A: What is ‘Path’ and Is It Safe for My Child?
Q: I overheard my son telling his friend to message him on Path. What is Path and should I be...
What is a Keylogger?
Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every...
Malware Manipulates Procedure Prologue and Epilogue to Evade Security
Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers,...
Helping Kids Understand Their ‘Digital Footprint’
It’s easy to talk in general about an important topic and apply a catchy phrase to it without our kids...
Before You Share, Ask Yourself “Is This TMI?”
Social networks and new online services make it easy to share the details of our lives, perhaps too easily. With...
Adult Voice-Service Apps on Google Play Japan Charge Users Without Notice
McAfee has reported on increasing fraudulent Android applications on Google Play in Japan this year, including one-click fraud applications and...
New Zero-Day Attack Copies Earlier Flash Exploitation
Late on July 10, Microsoft released a blog post disclosing that they were aware of a zero-day attack in the...
What Master Key? – Android Signature Bypass Vulnerability
Recently, a vulnerability in Android package signature verification was announced by Jeff Forristal, CTO of Bluebox Security. Jeff plans on...
Internet Browser Cookies: Not What Grandma Used To Make
Imagine you’re surfing the web in search of a new pair of shoes on Zappos.com. You browse the website, look...
Does Kik Messenger Pose a Danger to Your Kids?
With more than 50 million users, and reportedly growing by 20,000 everyday, Kik has become one of the most popular...
What is Typosquatting?
Typosquatting, also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright)...
McAfee Hidden Device Admin Detector – Free Protection from Android Malware
A few weeks ago, we told you about Obad, a backdoor Trojan that targets the Android operating system (OS). What...
Styx Exploit Kit Takes Advantage of Vulnerabilities
Web-based malware has increased over the last few years due to an abrupt spike in new exploit kits. These kits...