Consumer Threat Notices

Consumers want a fully connected life – but at what cost?

Convenience has always, and will always be king. That’s why it’s no surprise that the average person is collecting connected devices left and right and is expected to own 15 connected devices by 2030. While they vary from person to person, recent research shows that the most popular connected devices ...

Consumer Threat Notices

How Hackers Use Popular Shows to Infect Your Devices

If there’s one reasonable measurement of how popular a television series has become, it’s how often it’s illegally downloaded online. And for HBO’s hit series, Game of Thrones (GoT), episodes are stolen about as often as weddings are ruined in the series. That is to say: all of the time. ...

Consumer Threat Notices

The iPhone’s Biggest Weakness May Be Your Computer

Mobile malware is the fastest growing security threat we face today. But that threat has long been lopsided, and unfortunately, Android mobile operating system has seen the brunt of attacks due to its immense popularity and accessibility around the globe. Apple’s iOS ecosystem, while also widely popular, has maintained a ...

Consumer Threat Notices

The Internet of Things Needs a Standard. There’s a Consortium for That

Let’s talk about networks. A network can imply a number of things: it can imply a group of friends, coworkers and teams. It can be used to reference a grouping of schools, businesses and universities. And it can also imply a connection uniting each of these elements with one another. ...

Consumer Threat Notices

Yahoo! Mail Hacked: Secure Your Account Now

Last week, Yahoo! announced on their blog that the email accounts for an unspecified number of users had been compromised by hackers. They also echoed a sentiment frequently found on this blog, that “security attacks are unfortunately becoming a more regular occurrence.” Below are some details about the latest Yahoo! ...

Consumer Threat Notices

Top 5 Most Dangerous Email Subject Lines

If there is one thing we can learn from studying cybercriminal behavior in the previous year, it’s that they will always find ways to use new technologies and trends to their advantage in an attempt to dupe their victims. And despite this constant evolution, it’s also true that cybercriminals have ...

Subscribe to McAfee Securing Tomorrow Blogs