Mobile and IoT Security

Keeping Your Mobile Device (and Your Personal Life) Safe with IoT

Life is made up of the little things. There are ‘fuzzy feeling’ little things; like when the nice lady in front of you pays for your coffee, or when your boss acknowledges a report you went above and beyond to deliver. Then there are the less exciting, more mundane details. ...

Mobile and IoT Security

Mobile Pop-Ups, Digital Spam with a Side of Dangerous

Technology has become the personal assistant of our dreams, but also the crutch for our brains that we’ve grown increasingly reliant upon. There’s a seemingly unending supply of random information and factoids that you can glean from the web (did you know Scotland’s national animal is a unicorn?). We have ...

Mobile and IoT Security

Why You Should Update or Lose Your Mobile Apps

This blog was written by Bruce Snell. If you’re like me, you probably have at least a dozen apps on your smartphone that you never use. They just sit around taking up space in some forgotten corner of your device.  When you combine these unused apps with the tendency many ...

Mobile and IoT Security

Why You Should Think Before Geotagging that Selfie

Do you remember the first time you posted on social media? Maybe it was a blog on LiveJournal or an album of prom pictures on Facebook (bet that’s private now). If you’re like me, pressing that ‘share’ button probably felt a little scary. Who can actually see this stuff? Where ...

Mobile and IoT Security

Use an Airport App to Catch a Flight, Not a Bug

Traveling is supposed to be a break from reality, but that doesn’t mean it’s a breeze. First your Uber driver is going below the speed limit, then you can’t remember if you packed your computer charger, oh, and is your flight on time? There’s a lot to keep track of ...

Mobile and IoT Security

Behind the Mobile App: Your Data Exposed

Taylor Swift dropped a musical explosion when she released her music video for the song “Bad Blood” earlier this year. The song and its accompanying video captivated audiences as it depicted something many could relate to – being betrayed by a trusted peer. Who would have thought the basis of ...

Consumer Threat Notices

XcodeGhost Pulled from App Store After a Good Scare: What to Know

This week in cybersecurity was yet another for the books, as we watched a tech giant swiftly avert a security crisis. In a nutshell: a group of hackers found a way to access hundreds of iOS apps in Apple’s App Store in China, and potentially compromise user information. A wide ...

Mobile and IoT Security

SSL Packet Capture Is An Amateur Hacker’s Best Friend

Chances are, you’ve either heard of or used the catch phrase ‘there’s an app for that’ at least once before. So, when asked the question, ‘Do you want to steal a mobile app’s secrets?’ it may come as no surprise that there is, in fact, an app for that.  SSL ...

Mobile and IoT Security

Think Twice Before Trusting These 14 Android Apps with Your Login Information

In life, there are a handful of people that each of us truly trust – and can confide in fully. And, it’s safe to say, you’ve probably taken into consideration the trustworthiness of each one of your confidants. Maybe you’ve evaluated them on their ability to keep secrets in the ...

Subscribe to McAfee Securing Tomorrow Blogs