It’s not all fun and games when it comes to your favorite social media sites. Many of the top sites such as Facebook and Twitter are used for entertainment and leisure, but they also store vital information identity thieves would love to get their hands on and disrupt your online life. For instance, personal login information Read more…
Whether it’s customers visiting an eCommerce site via their smartphone, or cashiers using a mobile device to accept payments, chances are mCommerce has played a big role in how retail transactions are carried out today. However, despite the ubiquity, mobile devices also present a whole new array of security risks for both businesses and shoppers Read more…
It’s that time again: long sunny days, vacations in warm locales—the last thing you want to worry about as you’re planning your next summer getaway is being duped by travel-related scams on phony websites or having your identity stolen if your mobile device goes missing while on vacation. Previously, we’ve discussed best practices to keep Read more…
There are more sites growing in popularity in social network paradise and you may have even experienced first-hand. Our teens are giving Facebook a wide berth and investing their time in other ‘hip’ sites such as Instagram and Snapchat. Facebook even recently admitted that ’some of our users have reduced their engagement with Facebook in Read more…
In conjunction with our investigation into Operation Troy, we will be releasing IOC data in the open and highly flexible OpenIOC Framework format. The McAfee Operation Troy IOC can be downloaded here. In addition to various open/free tools, OpenIOC data can be consumed by: McAfee Read more…
PC Magazine awarded avast! Mobile Security the Editors’ Choice Award for free Android security apps thanks to its “huge array of powerful tools and fine-grained controls.” A major concern for smartphone owners is the increasing threat of malicious software targeting Android OS. Max Eddy, software analyst for PC Magazine, writes that, “avast! is well-positioned to guard […]
Recently, a vulnerability in Android package signature verification was announced by Jeff Forristal, CTO of Bluebox Security. Jeff plans on revealing details at the upcoming BlackHat Briefings at the end of this month. Though he has not released any details on his findings beyond the initial blog post more information is becoming available on how Read more…
Sometimes I wish there was a comprehensive handbook given to every parent when they leave the hospital with their new bundle. A real ‘how-to’ guide that provided concrete, black and white rules that you simply needed to implement to have a stress free experience with your child. How I wish!! But instead we have to Read more…
Imagine you’re surfing the web in search of a new pair of shoes on Zappos.com. You browse the website, look over a number of tennis shoes in your size. If you already have an account, you log in and save a couple of your favorites to a wish list. Eventually, you leave the site to Read more…
With more than 50 million users, and reportedly growing by 20,000 everyday, Kik has become one of the most popular messaging apps on the market. It is widely used as a messaging portal between those who want to connect privately off of other social media (Facebook, Twitter, and Instagram). But more importantly, it has become Read more…