Mobile and IoT Security

Return of the Hack

As our world has evolved, so has our technology. And, as that technology has evolved, so has its consumption. Now more than ever consumers are adopting the newest technological devices and integrating them into their daily lives. One prime example? Smart phones. Once used only to make phones calls and ...

McAfee Labs

Chinese Trojan Hooks Macs, iPhones

“Distrust and caution are the parents of security”–Benjamin Franklin A recent threat targeting Chinese users of Mac OS X and iPhone came to light yesterday. The malware, called WireLurker, is distributed by the Chinese third-party app store Maiyadi. Since the threat’s discovery, more than 400 applications containing the Trojan were ...

Consumer Threat Notices

Apple, SSL, and the Importance of Updating Your Software

Before we begin: please take a minute to update all of your iOS devices to the latest iOS version, iOS 7.0.6. Do that now. It takes five minutes. I’ll wait. Done? Good. Here’s why you needed that update: Apple’s iOS and OSX operating systems, the software that makes your iPhone ...

Mobile and IoT Security

McAfee Mobile Security: Now Available for iOS Devices

Apple fans rejoice! You too can take a bite out of cybercrime with our latest product release. We recently launched McAfee® Mobile Security for iOS devices, featuring a number of comprehensive protection options available previously only to Android users. Available for free, the software provides iPhones and iPads with a ...

Consumer Threat Notices

US-B Careful: Public iPhone Chargers Lie in Wait

I’ve mentioned many times about the dangers of connecting to public Wi-Fi, but who would have thought that connecting your phone to a public USB charger could expose you to similar malware dangers? Researchers at Georgia Tech have found a vulnerability in Apple’s iPhone that allows for malicious apps to ...

Family Safety

1-2-3: How to take a screen shot on your computer or mobile phone

There are some simple moves online that can save you an enormous amount of time. And when it comes to reporting abuses online nothing comes in handier than a screen shot, which is simply a photo file image of what’s in front of you on your computer screen or mobile ...

Consumer Threat Notices

Don’t Take a Bite out of that Apple Gift Card Scam

Good rule of thumb on the web: When it seems too good to be true, it probably is. Those ads on the right side of your web page, promising to give you a brand new iPad for absolutely free…probably a scam. The direct message on Twitter you received stating that ...

Family Safety

The Dilemma of Anonymity and Dangers of Ask.fm

Anonymity affords a precarious, irresistible power to teens online. Ask.fm is one app that’s exploding in popularity by allowing users to ask and answer questions to one another anonymously. While Ask.fm is used by many teens as a digital playground to flirt and just have fun (and confess crushes), the ...

Consumer Threat Notices

Mobile Myths: Can My Apple Devices Get Hacked?

“I bought a Mac, because it’s safer than a PC.” “I always surf the web with my iPhone, because I know it can’t get infected.” “I got a virus on my first PC, so now I only use Apple products.” Sound familiar? Too often, the rhetoric around the Mac vs. ...

Consumer Threat Notices

Hackers Gone Hipster: Are Tumblr and Instagram Users Still at Risk?

Two newsworthy vulnerabilities hit the stands this week, both of particular interest to many of our at-home users. Monday morning, an infectious Tumblr virus was found after it published offensive messages to a few high-profile blogs. On the same day, a new Instagram vulnerability was made public that could allow ...

Subscribe to McAfee Securing Tomorrow Blogs