Have a Tweeting Teen in Your House? Here’s What You Need to Know
Twitter has evolved over the past decade to mean different things to different people. For adults, the platform has morphed...
Running from Ransomware: A Mobile User’s Guide
From the second my alarm goes off, my day goes 100 miles a minute. In addition to getting myself ready...
LeakerLocker: Mobile Ransomware Acts Without Encryption
We recently found on Google Play a type of mobile ransomware that does not encrypt files. This malware extorts a...
We’ve Mastered Encrypted Messaging, So Are Encrypted Calls Next?
We’ve all heard the names before – WhatsApp, Viber, Telegram, Wire, Signal, Allo… with so many cyberattacks in the news...
Fake WannaCry ‘Protectors’ Emerge on Google Play
Are Android devices affected by the self-propagating ransomware WannaCry? No—because this threat exploits a vulnerability in Microsoft Windows. This malware...
How Using A VPN Could Save Your Summer
As summer inches closer, I begin to daydream about all the trips I’ll get to take with my family. However,...
Feeling Overwhelmed, Parents? Here’s Your Online Safety Cheat Sheet
Can we just get an extra five hours tacked onto each day so we can stay on top of our...
Analysis of Chrysaor Keylogging Mechanism Shows Power of Simple Malicious Code
Many attacks on mobile devices use social engineering to initially infect a victim’s system. They download malware and elevate privileges...
Instagram Has Hopped Aboard the 2FA Authentication Train Plus A Quiz for #SocialMediaDay
[os-widget path=”/mcafee/how-safe-are-you-on-social-media” of=”mcafee” comments=”false”] With over 500 million users, Instagram has quickly become one of the top dogs of social...
80% of IoT Apps Not Tested for Security Vulnerabilities, Study Says
We use mobile applications every day, and typically, multiple times throughout the day. They’ve become part of the way we...