Mobile and IoT Security – McAfee Blogs

  • Is Your Peloton Spinning Up Malware?
    by McAfee on June 16, 2021 at 4:01 am

    [Disclaimer: The McAfee ATR team disclosed this vulnerability to Peloton and promptly started working together to responsibly develop and issue a patch within the disclosure window. The patch was tested and confirmed effective on June 4, 2021.] Picture this: A hacker enters a gym or fitness center with a Peloton Bike+. They insert a tiny USB key with a boot The post Is Your Peloton Spinning Up Malware? appeared first on McAfee Blogs.

  • Avoid Making Costly Mistakes with Your Mobile Payment Apps
    by Lily Saleh on June 8, 2021 at 12:26 pm

    There used to be a time when one roommate split the cost of rent with another by writing a check. Who still owns a checkbook these days? Of course, those days are nearly long gone, in large part thanks to “peer to peer” (P2P) mobile payment apps, like Venmo, Zelle, or Cash App. Now with a simple click on an app, you can transfer your friend money for brunch before you even The post Avoid Making Costly Mistakes with Your Mobile Payment Apps appeared first on McAfee Blogs.

  • Don’t Sweat Your Security: How to Safely Incorporate IoT Into Your Fitness Routine
    by Jean Treadwell on May 14, 2021 at 1:12 pm

    Many have seamlessly transitioned their fitness regimens out of the gym and into the living room since the start of the COVID-19 pandemic, thanks in part to the use of IoT devices. IoT (Internet of Things) denotes the web of interconnected physical devices embedded with sensors and software to collect and share information via the internet. The most common IoT devices used for virtual The post Don’t Sweat Your Security: How to Safely Incorporate IoT Into Your Fitness Routine appeared first on McAfee Blogs.

  • Beware of Social Media Scams
    by Jean Treadwell on May 6, 2021 at 3:28 pm

    Social media is a great place to connect with friends and family. Unfortunately, it is also a great place for misinformation to run rampant, and it is a virtual treasure chest for cybercriminals to steal personal information. Over 25 million Canadians own a social media account, and more than 80% of the Canadian population is The post Beware of Social Media Scams appeared first on McAfee Blogs.

  • Fraudulent Apps that Automatically Charge you Money Spotted in Google Play
    by Baker Nanduru on May 4, 2021 at 2:19 pm

    Google’s Android operating system has been a boon for the average consumer. No other operating system has given so much freedom to developers and hardware manufacturers to make quality devices at reasonable prices. The number of Android phones in the world is astounding. That success comes with a price, however. A recent report from our own The post Fraudulent Apps that Automatically Charge you Money Spotted in Google Play appeared first on McAfee Blogs.

  • Beware of BRATA: How to Avoid Android Malware Attack
    by Vishnu Varadaraj on April 21, 2021 at 2:36 pm

    Cybercriminals go to great lengths to hack personal devices to gather sensitive information about online users. To be more effective, they make significant investments in their technology. Also, cybercriminals are relying on a tactic called social engineering, where they capitalize upon fear and urgency to manipulate unsuspecting device users to hand over their passwords, banking information, or other critical credentials.  One evolving mobile device threat that combines malware and social engineering tactics is The post Beware of BRATA: How to Avoid Android Malware Attack appeared first on McAfee Blogs.

  • Connect With Confidence: Benefits of Using a Personal VPN 
    by McAfee on April 24, 2020 at 7:40 pm

    Protect your digital life  The recent surge in work from home is likely accompanied by a corresponding increase in corporate VPN (virtual private network) usage. More and more employees who would typically be connected at the office are using these protected networks to access confidential documents and sites. To some, these corporate VPNs are simply a tunnel into their work lives. But what about the benefits of a personal VPN? What is a VPN The post Connect With Confidence: Benefits of Using a Personal VPN  appeared first on McAfee Blogs.

  • The Latest Mobile Scams & How To Stay Safe
    by Natalie Maxfield on April 15, 2020 at 3:50 pm

    If the challenges of working from home, connecting with family, and keeping on top of the news have you grabbing your phone more than ever, you’re not alone. Unfortunately, scammers are capitalizing on this opportunity. From fake apps, and dangerous text messages to phishing phone calls, mobile scams are multiplying, potentially putting your personal data and devices at risk. In fact, the Federal Trade Commission recently warned that they received a spike in user complaints as fraudsters The post The Latest Mobile Scams & How To Stay Safe appeared first on McAfee Blogs.

  • The mobile threats you can’t even see
    by Raj Samani on March 4, 2020 at 9:00 am

    Over the last year, we’ve seen more stories in the news than ever before about the big picture of cybersecurity, with politicians being increasingly public about how technology is affecting international relationships. All of this can make it feel like staying safe online is out of consumers’ hands, with decisions being made at the top The post The mobile threats you can’t even see appeared first on McAfee Blogs.

  • How vulnerability disclosure keeps you and your family safe
    by Raj Samani on February 26, 2020 at 6:11 pm

    Surrounded by smart home devices as well as apps which integrate with other services, we are entering an age of consumer technology where everything can talk to everything. For most consumers, this will just feel like the next logical step in a technological advancement which has been going on for decades. This year, we will The post How vulnerability disclosure keeps you and your family safe appeared first on McAfee Blogs.

  • The Seven Main Phishing Lures of Cybercriminals
    by McAfee on September 24, 2019 at 11:16 pm

    One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to America Online (AOL) every day. And if we know one thing about cybercriminals, it’s that they tend to follow the masses. In earlier iterations, phishing attempts were easy to The post The Seven Main Phishing Lures of Cybercriminals appeared first on McAfee Blogs.

  • Cybercrime’s Most Wanted: Four Mobile Threats that Might Surprise You
    by McAfee on September 3, 2019 at 6:17 pm

    It’s hard to imagine a world without cellphones. Whether it be a smartphone or a flip phone, these devices have truly shaped the late 20th century and will continue to do so for the foreseeable future. But while users have become accustomed to having almost everything they could ever want at fingertips length, cybercriminals were The post Cybercrime’s Most Wanted: Four Mobile Threats that Might Surprise You appeared first on McAfee Blogs.

  • How to Build Your 5G Preparedness Toolkit
    by McAfee on August 15, 2019 at 1:00 pm

    5G has been nearly a decade in the making but has really dominated the mobile conversation in the last year or so. This isn’t surprising considering the potential benefits this new type of network will provide to organizations and users alike. However, just like with any new technological advancement, there are a lot of questions The post How to Build Your 5G Preparedness Toolkit appeared first on McAfee Blogs.

  • School of Cyberthreats: 3 Attacks Impacting Today’s Schools
    by McAfee on July 23, 2019 at 6:55 pm

    Educational institutions are data-rich gold mines. From student and employee records to sensitive financial information, schools contain a plethora of data that can be obtained by cybercriminals rather easily due to lack of security protocols. This fact has cybercriminals pivoting their strategies, leading to a recent uptick in attacks on the education sector in the The post School of Cyberthreats: 3 Attacks Impacting Today’s Schools appeared first on McAfee Blogs.

  • Evolved IoT Linux Worm Targets Users’ Devices
    by McAfee on July 9, 2019 at 1:00 pm

    Since the early ‘90s, Linux has been a cornerstone of computer operating systems. Today, Linux is everywhere — from smartphones and streaming devices to smart cars and refrigerators. This operating system has been historically less susceptible to malware, unlike its contemporaries such as Windows or Mac OS. However, the widespread adoption of IoT devices has The post Evolved IoT Linux Worm Targets Users’ Devices appeared first on McAfee Blogs.

  • Catch a Ride Via Wearable
    by McAfee on June 25, 2019 at 10:44 pm

    More often than not, commuters and travelers alike want to get to their destination quickly and easily. The advent of wearable payments helps make this a reality, as passengers don’t have to pull out a wallet or phone to pay for entry. Adding to that, users are quickly adopting wearable technology that has this payment The post Catch a Ride Via Wearable appeared first on McAfee Blogs.

  • Say So Long to Robocalls
    by McAfee on June 11, 2019 at 1:00 pm

    For as long as you’ve had a phone, you’ve probably experienced in one form or another a robocall. These days it seems like they are only becoming more prevalent too. In fact, it was recently reported that robocall scams surged to 85 million globally, up 325% from 2017. While these scams vary by country, the The post Say So Long to Robocalls appeared first on McAfee Blogs.

  • 3 Things You Need to Know About Summer Cybersecurity
    by McAfee on May 22, 2019 at 7:43 pm

    The summer season is quickly approaching. Users will take to the skies, roads, and oceans to travel throughout the world for a fun family adventure. But just because users take time off doesn’t mean that their security should. So, with the season’s arrival, we decided to conduct a survey so to better understand users’ cybersecurity The post 3 Things You Need to Know About Summer Cybersecurity appeared first on McAfee Blogs.

  • #Verified — Worth the Risk?
    by McAfee on May 7, 2019 at 6:25 pm

    In the social media world, a little blue checkmark next to a username is a sought-after status symbol. Celebrities, global brands, famous pets, and public figures alike have verified Instagram accounts, indicating to fans that the account they are following is “verified” as the real deal. With an established social presence and verified status, these The post #Verified — Worth the Risk? appeared first on McAfee Blogs.

  • From Internet to Internet of Things
    by McAfee on April 22, 2019 at 1:00 pm

    Thirty years ago, Tim Berners-Lee set out to accomplish an ambitious idea – the World Wide Web. While most of us take this invention for granted, we have the internet to thank for the technological advances that make up today’s smart home. From smart plugs to voice assistants – these connected devices have changed the The post From Internet to Internet of Things appeared first on McAfee Blogs.

  • What’s in Your IoT Cybersecurity Kit?
    by McAfee on April 9, 2019 at 1:00 pm

    Did you know the average internet-enabled household contains more than ten connected devices? With IoT devices proliferating almost every aspect of our everyday lives, it’s no wonder IoT-based attacks are becoming smarter and more widespread than ever before. From DDoS to home network exposures, it appears cybercriminals have set their sights on the digital dependence The post What’s in Your IoT Cybersecurity Kit? appeared first on McAfee Blogs.

  • Social Media: Where Cybercrime Lurks in the Shadows
    by McAfee on March 26, 2019 at 1:00 pm

    When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark web. Last year, however, cybercriminals made the jump over to social media and cashed in big – $3 billion worth, as a matter of fact. With approximately 2.77 billion people using one social media account The post Social Media: Where Cybercrime Lurks in the Shadows appeared first on McAfee Blogs.

  • You Rang? New Voice Phishing Attack Tricks Unsuspecting Users
    by McAfee on March 12, 2019 at 1:00 pm

    In this digital day and age, the average user is likely familiar with the techniques and avenues cybercriminals use to get ahold of personal data and money. With this knowledge, we’ve become smarter and keen to the tricks of the cybercrime trade. However, cybercriminals have become smarter too, and therefore their attacks have become more The post You Rang? New Voice Phishing Attack Tricks Unsuspecting Users appeared first on McAfee Blogs.

  • In 2019 the Threat is “Everywhere Malware”, Not just Mobile Malware
    by Raj Samani on February 27, 2019 at 7:00 am

    This time last year, we said that 2018 would be the year of mobile malware. Today at MWC, we’re calling 2019 the year of everywhere malware. In their quest for profit, criminals are constantly forced to shift their tactics and adapt to a changing mobile market. Take crypto-mining, for example. A year ago this was The post In 2019 the Threat is “Everywhere Malware”, Not just Mobile Malware appeared first on McAfee Blogs.

  • Open Backdoors and Voice Assistant Attacks: Key Takeaways from the 2019 Mobile Threat Report
    by McAfee on February 26, 2019 at 8:00 am

    These days, we seem to have a newfound reliance on all things ‘smart.’ We give these devices the keys to our digital lives, entrusting them with tons of personal information. In fact, we are so eager to adopt this technology that we connect 4,800 devices per minute to the internet with no sign of slowing down. The post Open Backdoors and Voice Assistant Attacks: Key Takeaways from the 2019 Mobile Threat Report appeared first on McAfee Blogs.

  • Roses Are Red, Violets Are Blue – What Does Your Personal Data Say About You?
    by McAfee on February 11, 2019 at 2:00 pm

    A classic meet-cute – the moment where two people, destined to be together, meet for the first time. This rom-com cornerstone is turned on its head by Netflix’s latest bingeable series “You.” For those who have watched, we have learned two things. One, never trust someone who is overly protective of their basement. And two, The post Roses Are Red, Violets Are Blue – What Does Your Personal Data Say About You? appeared first on McAfee Blogs.

  • 5G Is Coming: Security Risks You Need to Know About
    by McAfee on January 22, 2019 at 7:08 pm

    The future of connectivity is here ­– 5G. This new network is set to roll out across the nation this coming year and bring greater speed to our handheld devices, which means more data and lower latency. But perhaps one of the most anticipated and popular benefits is it will allow even more IoT devices The post 5G Is Coming: Security Risks You Need to Know About appeared first on McAfee Blogs.

  • How to Protect Three Common IoT Devices in 2019
    by McAfee on January 8, 2019 at 2:00 pm

    It’s no secret – IoT devices are creeping into every facet of our daily lives. In fact, Gartner estimates there will be 20.4 Billion IoT devices by the year 2020. More devices mean greater connectivity and ease of use for their owners, but connectivity also means more opportunities for hacks. With CES 2019 kicking off this The post How to Protect Three Common IoT Devices in 2019 appeared first on McAfee Blogs.

  • What CES Can Show Us About Evolving Consumer Security Needs: A Timeline
    by McAfee on December 18, 2018 at 2:00 pm

    Appropriately dubbed the ‘Global Stage for Innovation,’ it’s no wonder CES showcases the most cutting-edge consumer technologies coming out in the year ahead. No topic is off the table; Attendees will learn more about connected homes, smart cities and self-driving cars, try out shiny new digital health wearables, headsets, and other connected tech, explore AI-driven The post What CES Can Show Us About Evolving Consumer Security Needs: A Timeline appeared first on McAfee Blogs.

  • 12 Days of Hack-mas
    by McAfee on December 11, 2018 at 5:50 pm

    2018 was a wild ride when it came to cybersecurity. While some hackers worked to source financial data, others garnered personal information to personalize cyberattacks. Some worked to get us to download malware in order to help them mine cryptocurrency or harness our devices to join their botnets. The ways in which they exact their The post 12 Days of Hack-mas appeared first on McAfee Blogs.

Share This Information.

Leave a Reply

Your email address will not be published. Required fields are marked *