Today we are going to talk to those of you who use Bitcoin digital currency to pay for a variety of goods and services – along with a warning about yet another source of Bitcoin miners – the sharing services. You may think that if you avoid cracks and keygens while browsing the web you […]
McAfee has been monitoring and reporting extensively on one-click-fraud malware for Android in Japan this year. These attacks, primarily on Google Play, have become more active recently. We have found about 400 fraudulent apps in July alone. We consistently report these issues to Google, which promptly revokes the apps, but the scammers never stop uploading Read more…
Would you like a sneak-peek into avast! Mobile Security version 3, avast! Anti-Theft and the debut of a new product, avast! Backup? We are looking for advanced users to participate in the avast! Mobile Security Beta test starting today. This Beta test will run for a full week in which time you can give us valuable feedback that we can […]
The whole purpose of your “youth” is to grow and learn. It’s time to take in lots of information, so ultimately they can evolve, accomplish, and get ahead. However the pressure to grow and climb the ladder of life often leads to unwanted behaviors and actions that lead to significant negative consequences. And with everyone Read more…
Mobile devices nowadays are larger than life: We take them to work, the grocery store, the doctor’s office, and pretty much anywhere else we want to stay connected. We use them from the moment we wake up to the moment we go to bed. We browse the web, snap photos, check our email, even deposit Read more…
McAfee has always been in forefront of finding new ways for securing our customers against threats and risks posed with mobile device. As part of this quest, we have introduced the concept of app reputation as part of our latest release of McAfee Mobile Security (MMS)(Ver 3.1) released on 18th July 2013. From a consumer perspective, Read more…
Question of the week: I am going to buy a new laptop before school starts again. How do I ensure that my old laptop is completely clean of old credit card numbers, passwords, and personal files before I sell it? It’s good that you thought of this important task before selling your old hardware to […]
Could your car be the next target of a cyber attack? You might not think so, but new research has shown otherwise. The overall safety of your vehicle used to be rather straightforward to maintain with tune-ups, replaced brake pads, flushes and other scheduled upkeep. Unfortunately, with the incorporation of computer systems into newer car Read more…
The Android Master Key vulnerability, which was first reported by BlueBox Security, has been big news this month. McAfee explained the vulnerability and defense against future malware exploiting it in a previous blog. Last week the first malware that exploit the Master Key vulnerability were found in an Android application market in China. The app Read more…
Let’s just say it. The world is going mobile. Practically any task you can perform on your computer, you can also do with a mobile phone, and there are even a few that your computer can’t do. In just moments, you can simultaneously shop for shoes, deposit a check and then quickly buy a plan Read more…