Samsung Galaxy devices now come equipped with McAfee's patented and powerful AI-powered scam protection technology that safeguards against the surge in AI-generated phishing scams. McAfee expands ...
"It's about protecting devices, the data on those devices and ensuring that the applications being used are not infected with malware," said John Dasher, senior director of mobile security at McAfee, ...
McAfee announces holistic online protection globally with a new Identity Protection Service delivered through the McAfee Protection Center, an industry-first personalized Protection Score, and an ...
McAfee, a provider of intrusion prevention and risk management software, says it created VirusScan Mobile to address the growing number of security threats against mobile devices, such as viruses, ...
Intel’s acquisition of security company McAfee could help the chip maker make a splash in the handheld and embedded markets, in which the company has struggled to establish a presence, according to ...
McAfee Tuesday said it’s signed an agreement to acquire privately held Trust Digital as part of its strategy to expand into the mobile security arena, the enterprise sector in particular. The ...
Intel-owned McAfee has released Mobile Security 2.0, which allows users of Android-based smartphones and tablets to keep better track of what applications are up to, the company said on Monday. Today, ...
BARCELONA--(BUSINESS WIRE)--A third of people don’t bother to protect their mobile phone or tablet with a PIN or password, according to a global survey of 3,000 consumers by McAfee and One Poll. Most ...
There will be an increase in mobile malware in 2006, which could cause extensive damage to mobile devices because only a small percentage of mobile users run security software, according to McAfee’s ...
McAfee has updated its firewall software to prevent threats from creeping into enterprise systems through insecure mobile clients, it said Monday. McAfee Desktop Firewall 8.5 allows administrators to ...
New forms of cyber attacks that can evade traditional threat detection are granting hackers access to critical information stored in personal computers and in the cloud, according to a new report.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results