5 Questions to Ask Before Your Kids Download that App
We now spend a staggering 86% of our mobile time on apps, according to the latest stats. Downloading apps and...
6 Tips for Protecting Your Social Media Accounts
10 years ago, many of us were hearing about social media for the first time. Now, social media plays a...
Taking a Close Look at Data-Stealing NionSpy File Infector
This blog was written by Sanchit Karve. W32/NionSpy is a family of malware that steals information from infected machines and...
Teslacrypt Joins Ransomware Field
A newly crafted ransomware, Teslacrypt, has arrived in the malware genre that encrypts user files using AES encryption and demands...
Hacking Humans: How Cybercriminals Trick Their Victims
McAfee has compiled a list of the top ways cybercriminals play with the minds of their targeted victims. And the...
Steamstealer Attacks Victims via Chat
During the last few months, McAfee Labs has seen an increase in Steamstealer samples. The following chart shows the recent...
How Password Managers are Saving the Day
As I get older, I am convinced that my memory is fading. Whether it’s names, places or even passwords, my...
Apps Sending Plain HTTP Put Personal Data at Risk
At the AVAR Conference in November 2014, McAfee Labs presented how to exploit a cross-site scripting vulnerability of the Costco...
2014: Security Year in Review
From the Heartbleed bug to large-scale (and highly publicized) data breaches, Shellshock to mobile threats—2014 did not leave us wanting...
What is Pharming?
. For a lot of kids today, mash-ups are all the rage—whether it’s combining two videos, two songs, or two...