[breadcrumb]
Internet Security Mobile Security

Hackers are Cashing in on Instagram Likes

They say popularity has its price. This saying holds a new weight when it comes to the growing influence of...

Mobile Security

Where, oh Where, Does That QR Code Lead?

What is square, flat, and black and white all over? If you answered “a QR Code”, you’re correct. One of...

McAfee Labs

Cidox Trojan Spoofs HTTP Host Header to Avoid Detection

Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP...

Internet Security Security News

Don’t Take a Bite out of that Apple Gift Card Scam

Good rule of thumb on the web: When it seems too good to be true, it probably is. Those ads...

Internet Security Mobile Security

BYOD: Balancing Convenience and Security

It lies next to you as you sleep, comes with you to work, rides home with you in your car...

Mobile Security

Spy? Where? Mobile Spyware Hiding Right Under Your Nose

Some days it feels like the whole world is going mobile. We tweet, we text, we browse the world from...

McAfee Labs

Android App Contains Windows Worm

When developers are unaware of security they open the door to threats against their customers and users. We are not...

McAfee Labs

Java Back Door Acts as Bot

The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found...

McAfee Labs

Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code

Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware...

Family Safety

5 (Kind) Reminders for Overly Nosy Parents

Last night I sat next to my teenage son as he played video games. It did not take long before...

Subscribe to McAfee Securing Tomorrow Blogs