Wonder Twin powers activate! Shape of a Pterodactyl! Form of an icicle! Watching the Super Friends on Saturday mornings in my pjs while eating sugared cereal for breakfast and reading comic books was the extent of my relationship with super heroes. Ahh… those were much simpler times. Today kids can find everything they need to Read more…
Mobile technology is the new frontier for fraudsters. Most of us don’t protect our smartphones or tablets—and the private information they contain—anywhere near as well as we do our wallets and PCs (even though most us would rather lose our wallets vs. our smartphones). Even the simple safeguard of a four-digit password is too much Read more…
Typosquatting, also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright) that targets Internet users who incorrectly type a website address into their web browser (e.g., “Gooogle.com” instead of “Google.com”). When users make such a typographical error, they may be led to an alternative website owned Read more…
You’re on Facebook, LinkedIn and Twitter. You use Gmail, Yahoo! and bank online. You might buy stuff on sites like Amazon and occasionally make purchases from eBay. Sometimes you apply for a loan online and maybe open up a credit card account too. This is all commonplace in today’s digital world. So how does all Read more…
When devices are lost or hacked and your data is exposed, not only is this a pain to deal with, but you could become a victim of identity theft. Not only do victims of identity theft suffer loss of time but they also lose money that may not be able to be recovered . In Read more…
A cybercriminal’s full time job is creating new crimes, and he or she will make full use of technology to hide their activities to fool you. And with mobile devices, this is no different. The threat to our mobile devices is also high because our smartphones are always connected, they usually carry some personal data, Read more…
Earlier this week McAfee Labs™ released the McAfee Threats Report: First Quarter 2013, which reported that malware shows no sign of changing its steady growth, which has risen steeply during the last two quarters. Many of the most significant growth trends from previous three quarters actually went into remission, while older types of attacks and Read more…
Many of you as parents may think, “not much” when asked this question. But in reality, it’s probably a lot more than you think. So it should come as no surprise to anyone that McAfee’s 2013 study, Digital Deception: Exploring the Online Disconnect between Parents and Kids, which examines the online habits and interests of tweens, Read more…
Cybercrime is one of the most lucrative illegal businesses of our time, and it shows no signs of slowing down. Over the last decade, cybercriminals have developed new and increasingly sophisticated ways of capitalizing on the explosion of Internet users, and they face little danger of being caught. Meanwhile, consumers are confronted with greater risks Read more…
If your computer or mobile was hacked or your passwords were cracked and your data was lost or if all the websites you have an account with were hacked and all that information was the hands of a criminal, how devastated will you be? In McAfee’s study on the value of digital assets, consumers estimated Read more…