Feeling Overwhelmed, Parents? Here’s Your Online Safety Cheat Sheet
Can we just get an extra five hours tacked onto each day so we can stay on top of our...
Analysis of Chrysaor Keylogging Mechanism Shows Power of Simple Malicious Code
Many attacks on mobile devices use social engineering to initially infect a victim’s system. They download malware and elevate privileges...
Instagram Has Hopped Aboard the 2FA Authentication Train Plus A Quiz for #SocialMediaDay
[os-widget path=”/mcafee/how-safe-are-you-on-social-media” of=”mcafee” comments=”false”] With over 500 million users, Instagram has quickly become one of the top dogs of social...
80% of IoT Apps Not Tested for Security Vulnerabilities, Study Says
We use mobile applications every day, and typically, multiple times throughout the day. They’ve become part of the way we...
Banned Chinese Qvod Lives on in Malicious Fakes
Qvod used to be a popular video player and developer in China. Due to piracy allegations and a threatened fine,...
So, Your Phone Got Stolen. Here’s What to Do.
The Coachella Music and Arts Festival is known for 3 days of desert heat, trendy tunes, and breathtaking art installations,...
Distracted Driving: Is Your Life (or Someone Else’s) Worth that Text?
“We had talked about it and talked about it so many times, but she never thought anything like this would...
Pre-Installed Malware on Android Devices Expose Flaws in Supply Chain
Pencils come with erasers, books come with pages, and taxes (most of the time) come with returns. People like it...
MWC 2017: What We Learned About the Mobile Landscape
MWC (Mobile World Congress) has come and gone yet again, and over the course of the four-day conference we’ve seen...
Mobile World Congress: The Evolution of Mobile Security Through the Years
As I prep for Mobile World Congress, I’ve done some reflecting on my very first cell phone. Whether it was...