Before You Share, Ask Yourself “Is This TMI?”

Social networks and new online services make it easy to share the details of our lives, perhaps too easily. With just a few clicks, posts and messages, you can give away enough personal information to compromise your privacy and even open yourself up to identity theft. Hackers use information you post online to try and Read more…

Aquaman, King of the Seven Seas May Also be King of Threats

Wonder Twin powers activate! Shape of a Pterodactyl! Form of an icicle! Watching the Super Friends on Saturday mornings in my pjs while eating sugared cereal for breakfast and reading comic books was the extent of my relationship with super heroes. Ahh… those were much simpler times. Today kids can find everything they need to Read more…

Teens: Hello Instagram!

      No Comments on Teens: Hello Instagram!

There are more sites growing in popularity in social network paradise and you may have even experienced first-hand. Our teens are giving Facebook a wide berth and investing their time in other ‘hip’ sites such as Instagram and Snapchat. Facebook even recently admitted that ’some of our users have reduced their engagement with Facebook in Read more…

No More Lost Data: Connect Your Mobile Device Offline

We’d all like to think that with the current offerings and enhancements in mobile services we have unfailing access to the information superhighway. High-bandwidth, mobile networks (4G LTE) promise the speediest connection for all of your data—email, photo posts, check-ins—anywhere, anytime. The truth is that although we feel completely connected through our mobile devices, this Read more…

Operation Troy: OpenIOC Release

      No Comments on Operation Troy: OpenIOC Release

  In conjunction with our investigation into Operation Troy, we will be releasing IOC data in the open and highly flexible OpenIOC Framework format. The McAfee Operation Troy IOC can be downloaded here.       In addition to various open/free tools, OpenIOC data can be consumed by:             McAfee Read more…

Adult Voice-Service Apps on Google Play Japan Charge Users Without Notice

McAfee has reported on increasing fraudulent Android applications on Google Play in Japan this year, including one-click fraud applications and fraudulent adult dating service applications. The attackers are still looking for new victims using various techniques. We have also found a new variant of the one-click fraud application that lures careless users into adult voice-connection Read more…

New Zero-Day Attack Copies Earlier Flash Exploitation

Late on July 10, Microsoft released a blog post disclosing that they were aware of a zero-day attack in the wild. This attack exploits a previously unpatched Internet Explorer vulnerability (CVE-2013-3163). It’s interesting that the vulnerability was just patched in this month’s Patch Tuesday (July 9), which is perhaps only a coincidence. Although we do Read more…

User Ignorance of Cloud Services Poses a Data Leak Challenge

Cloud-based online services are useful tools for many enterprises, allowing them to coordinate their teams, share information and enable discussions within groups. However, companies should be sharply aware of how they manage their privacy settings for…

avast! Mobile Security gets Editors’ Choice Award from PC Magazine

PC Magazine awarded avast! Mobile Security the Editors’ Choice Award for free Android security apps thanks to its “huge array of powerful tools and fine-grained controls.” A major concern for smartphone owners is the increasing threat of malicious software targeting Android OS. Max Eddy, software analyst for PC Magazine, writes that, “avast! is well-positioned to guard […]