iOS app Android app


John McAfee Captured?

Dominique Mosbergen | Posted 12.03.2012 | Technology

Has John McAfee been captured? After weeks on the run, the 67-year-old software pioneer and founder of the McAfee anti-virus company has reportedly...

McAfee Now In Disguise Involving Tampons, 'Disgusting Appearance'

Posted 11.19.2012 | Technology

It should come as no surprise that the pioneer of a successful software and internet security company seems a touch oversuspicious. But the latest dev...

John McAfee's Island Life Was Full Of Guns, Girls And Dogs

Reuters | Posted 01.19.2013 | Technology

SAN PEDRO, Belize (Reuters) - To the many people who crossed his path on a tropical island in Belize, it was apparent John McAfee's life had taken som...

Software Pioneer Says Neighbor Was 'Annoyance,' But Denies Killing Him

AP | JOSE OSORIO and MARK STEVENSON | Posted 01.14.2013 | Crime

SAN PEDRO, Belize — Software company founder John McAfee said Wednesday he is in hiding, unarmed and accompanied only by a young woman, changing...

Security Software Software Pioneer Says He Is Being Framed For Murder

Reuters | Posted 01.13.2013 | Technology

* Tech millionaire in hiding after neighbor's murder * Proclaims innocence in Wired magazine interview BELIZE CITY, Nov ...

And The Internet's Most Dangerous Celebrity Is...

AP | Posted 09.10.2012 | Technology

NEW YORK -- Emma Watson is the favorite celebrity bait for cyber criminals trying to lure Internet users. McAfee said Monday that the "Harry Potter" ...

I Found Your Data on That Used Device You Sold

Robert Siciliano | Posted 05.01.2012 | Technology
Robert Siciliano

Did you know it is very likely that you inadvertently put all of your digital data in someone else's hands if you no longer have the device?

How To Steal A Car: Hack It!

Robert Siciliano | Posted 04.14.2012 | Crime
Robert Siciliano

No more jimmying doors with a Slim Jim, bricks through windows, extracting lock cylinders with a dent puller, or hot-wiring ignitions. Automobiles tod...

McAfee Bug Could Turn PCs Into Spam Servers

Reuters | Jim Finkle | Posted 03.20.2012 | Technology

By Jim Finkle BOSTON (Reuters) - Anti-virus software maker McAfee warned that a flaw in one of its products could make customers' PCs v...

2012 Threats: Are You Ready?

Robert Siciliano | Posted 03.06.2012 | Technology
Robert Siciliano

As technology evolves and our use of the Internet and mobile devices becomes more complex, cybercriminals are also evolving and honing their skills with new types of attacks.

The Reasons Consumers Aren't Buying From Your Website

The Huffington Post | Rieva Lesonsky | Posted 12.22.2011 | Small Business

Shopping online is rapidly becoming the norm, with consumers moving from online shopping to mobile shopping in record numbers this holiday season. But...

Antiquated Economic Policies Are Killing Jobs More Than Robots

Robert D. Atkinson, Ph.D. | Posted 02.08.2012 | Technology
Robert D. Atkinson, Ph.D.

Rather than rail against the machine, pundits and policy makers would do better to embrace technology-led productivity, while at the same time do much more to help workers adjust to changes.

Top 10 Most Dangerous Celebrities

The Huffington Post | Ramona Emerson | Posted 11.16.2011 | Technology

Forget the Oscars: Computer security company McAfee has released its fifth annual top ten list of worst celebrities to search for if you want to hold ...

Gerry Smith

Security Firm Renews Debate Over Chinese Cyberspying | Gerry Smith | Posted 10.03.2011 | Technology

As a massive cyberspying operation came to light on Wednesday, revealing more than 70 targets in 14 countries, security experts pointed the finger at ...

Gerry Smith

Report Outlines Massive Global Cyberspying Operation | Gerry Smith | Posted 10.03.2011 | Technology

More than 70 companies, governments and non-profit organizations around the world were attacked by hackers in a massive cyberspying operation that exp...

15 Tips to Better Password Security

Robert Siciliano | Posted 09.11.2011 | Technology
Robert Siciliano

Protect your information by creating a secure password that makes sense to you, but not to others. Most people don't realize there are a number of co...

North Korea Blamed For Cyberattack On U.S. and South Korea: Report

AP | LOLITA C. BALDOR | Posted 09.04.2011 | World

WASHINGTON — North Korea or its sympathizers were likely responsible for the cyberattack against South Korean government and banking websites ea...

5 Tips to Avoid Bin Laden Scams

Robert Siciliano | Posted 07.09.2011 | Technology
Robert Siciliano

After Osama bin Laden's death a flurry of internet scams hit the internet. Most notably scam emails with links to pictures, videos and phony Facebook messages with links to videos that don't exist.

Most Companies Keeping Mum On Data Breaches

The Huffington Post | Amy Lee | Posted 05.28.2011 | Technology

For corporations, the threat of data breach is more dangerous than ever--but, according to a new study, most companies still do not take the measures ...

Tsunami Scam Warnings Keep Coming In

Robert Siciliano | Posted 05.25.2011 | Impact
Robert Siciliano

Hundreds of domains that could be related to the disaster have been registered so far today, including a scam site that appeared within just two hours of the earthquake.

Tax Related Identity Theft Scams up 300%

Robert Siciliano | Posted 05.25.2011 | Business
Robert Siciliano

Cases of stolen tax returns have surged over the past five years, leaving many identity theft victims struggling to recoup their lost refunds.

Even Savvy Shoppers Can Get Scammed -- Tips for the Holiday Shopping Season

David Gorodyansky | Posted 05.25.2011 | Business
David Gorodyansky

It's the most wonderful time of the year! Well, it's supposed to be, but as holiday shopping amps up online, so does the threat of identity theft.

Colorado Supreme Court: Using a Stolen Social Security Number is Not Identity Theft

Robert Siciliano | Posted 05.25.2011 | Business
Robert Siciliano

I feel like my head is going to explode. The Colorado Supreme Court has ruled "that using someone else's Social Security number is not identity thef...

RANKED: The World's Top 5 Most Dangerous Web Domains

The Huffington Post | Catharine Smith | Posted 05.25.2011 | Technology

McAfee, an Internet security software provider, has released its fourth annual "Mapping the Mal Web" report (PDF), which rates the world's riskiest to...

Man Lived Under Stolen Identity for More than a Decade

Robert Siciliano | Posted 05.25.2011 | Business
Robert Siciliano

All forms of documentation are easily counterfeited. This means anyone can simply copy, scan, manipulate, and print a document, obtain your digits, and become you.