Geinimi Android Trojan horse discovered
Updated: 2010-12-31 17:00:24
Android users may not be at risk from as much malware on their smartphone as on their desktop computer, but that doesn't mean they should be careless about security. Read more…
: Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer About Me Jimmy Shah Jimmy Shah is a Mobile Security Researcher for McAfee , specializing in analysis of mobile threats on existing Read More Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Anil Ramabhatta Anindita Mishra Anna Stepanov Apurv Anand Arun Pradeep Avelino Rico Jr Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Kenyon Brian Mann Cedric Cochin Chen Yu Chintan Shah Chris Barton Craig Schmugar Dan Sommer Dave Klenske David DeWalt David Marcus
Turn autoplay off Turn autoplay on Please activate cookies in order to turn autoplay off Jump to content s Jump to comments c Jump to site navigation 0 Jump to search 4 Terms and conditions 8 Mobile site Sign in Register Text larger smaller About us About us Contact us Press office Guardian Print Centre Guardian readers' editor Observer readers' editor Terms of service Privacy policy Advertising guide Digital archive Digital edition Guardian Weekly Buy Guardian and Observer photos Subscribe Today's paper The Guardian G2 features Comment and debate Editorials , letters and corrections Obituaries Other lives Sport Film music Subscribe Zeitgeist Today's hot topics guardian.co.uk Technology Web News Sport Comment Culture Business Money Life style Travel Environment TV Video Data Offers Jobs
Mozilla, of Firefox and Thunderbird fame, had accidentally published the user IDs and password hashes of users of their addons.mozilla.org website. It appears their reaction to the disclosure has contained the damage, but what can be done to prevent these incidents in the future? Read more…
Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer About Me Jim Walter Jim Walter currently serves as manager of the McAfee Threat Intelligence Service MTIS for McAfee Labs , and focuses Read More Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Anil Ramabhatta Anindita Mishra Anna Stepanov Apurv Anand Arun Pradeep Avelino Rico Jr Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Kenyon Brian Mann Cedric Cochin Chen Yu Chintan Shah Chris Barton Craig Schmugar Dan Sommer Dave Klenske David DeWalt David
Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer About Me Sam Masiello Director of Messaging Security Research Sam Masiello oversees research across the full spectrum of Read More Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Anil Ramabhatta Anindita Mishra Anna Stepanov Apurv Anand Arun Pradeep Avelino Rico Jr Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Kenyon Brian Mann Cedric Cochin Chen Yu Chintan Shah Chris Barton Craig Schmugar Dan Sommer Dave Klenske David DeWalt David Marcus David Rayhawk
Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 22 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 222 Corporate 181 Enterprise 299 McAfee Labs 1031 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government
This portable safe BioBox keeps all of your important possessions secure at all times and battery-powered for on-the-go security. With up to 120 registered users and a mechanical backup key, you can grant access to everyone that you want - perfect for large businesses.
Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government
Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government
Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government
Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government
Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government
Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive December 2010 19 November 2010 35 October 2010 45 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 221 Corporate 181 Enterprise 298 McAfee Labs 1030 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government