HiddenAds Spread via Android Gaming Apps on Google Play
Authored by Dexter Shin Minecraft is a popular video game that can be played on a desktop or mobile. This...
Category Added in a WPeMatico Campaign
Authored by Dexter Shin Minecraft is a popular video game that can be played on a desktop or mobile. This...
Authored by Dexter Shin McAfee Mobile Research Team found an Android banking trojan signed with a key used by legitimate...
Authored by Lakshya Mathur and Sriram P McAfee Intelligence observed a huge spike in extortion email frauds over the past month....
“I bought a Mac, because it’s safer than a PC.” “I always surf the web with my iPhone, because I...
Monkey in the middle, the beloved playground staple, extends beyond schoolyards into corporate networks, home desktops, and personal mobile devices...
An Analysis of the BabLock Ransomware Ransomware This blog post analyzes a stealthy and expeditious ransomware called BabLock (aka Rorschach),...
Ransomware. Even the name sounds scary. When you get down to it, ransomware is one of the nastiest attacks a...
It’s important to note that the only time your communications are encrypted is when they’re in transit. They’re otherwise plain...
Authored by SangRyol Ryu McAfee’s Mobile Research Team discovered a software library we’ve named Goldoson, which collects lists of applications...
What is a VPN (virtual private network)? And how can it make your time online more secure—and a little more...
The pop-up toaster as we know it first hit the shelves in 1926, under the brand name “Toastmaster.” With a...
The term “zero-day threat” may sound like the title of a hit film, but it’s definitely not that kind of...
This blog post was written by Bruce Snell. This past weekend I was at a local roller rink where my...
Ping, it’s a scammer! The sound of an incoming email, text, or direct message has a way of getting your...
So, can Android phones get viruses and malware? The answer is yes, and likewise you can do several things to...