Tackling Attack Detection and Incident Response

Discover the key factors that slow many organizations’ incident response rates.

Read ESG Report

Verizon taps McAfee Labs'
expertise for 2015 data breach report

Read Report

Webcast: 10 Biggest Mistakes in Implementing Continuous Monitoring

Join us October 14 for tips to increase threat detection and correction.

Register Now

When Minutes Count

How experts fight advanced threats with real-time SIEM and identification of eight key indicators of attack

Read Report

Security Tips

From text message spam on smartphones to new malware that hijacks and locks down computers, Internet threats are continually evolving. Learn how the latest online threats operate and the key steps you can take to protect your email, network, and business.

How Cybercriminals Target Social Media Accounts

Cybercriminals are targeting social media users’ accounts now more than ever.

Infographic: How Confident Are Online Consumers?

This infographic looks at consumer attitudes toward shopping online and outlines how a security breach or the lack of a visible security policy or indicator can change a consumer’s decision to do business on a website, directly impacting an online merchant’s sales conversions.

Five Ways to Mitigate a Big-Scale Attack

Malicious attacks — where the only goal is to cause as much damage as possible — are expected to grow in 2013. Here are five key tips for enterprises to help mitigate the impact of these attacks aimed at breaching database and network security.

Threat Trends

Whether you are a security professional or simply looking to learn more about online threats, McAfee researchers will guide you through the current threat landscape. Our analysis helps you understand overall threat trends, how malware and Internet threats are evolving, and which devices and payloads cybercriminals are targeting — key insights that can help you protect your business.

McAfee Labs Threats Report: August 2015

The August 2015 McAfee Labs Threats Report takes a five-year look back at the changes in cybersecurity, analyzes tactics used by attackers to steal data, and examines malware attacks on graphics processing units (GPUs).

McAfee Labs Threats Report: May 2015

For the first time ever, we explore attacks on firmware. We also highlight Adobe Flash exploits that target the growing number of vulnerabilities not patched by users and a surge in powerful new ransomware that encrypts files and holds them hostage until the ransom is paid.

Catch Me If You Can: Antics of a Polymorphic Botnet

See how Intel Security and a global law enforcement action took down a major botnet that infected over 100,000 systems globally.

Threats A-Z: Security defined and simplified

Learn More

McAfee Labs Threats Report: The latest stats and trends

View Infographic

The changing threat landscape: A five-year retrospective

View Infographic

McAfee Labs Blog

Join the Conversation Next Page

  • McAfee Labs Team Wins Péter Ször Award
    Vincent Weafer - October 1, 2015

    On October 2 at Virus Bulletin’s VB2015 conference in Prague, Virus Bulletin Editor Martijn Grooten announced that Anand Bodke, Abhishek Karnik, Sanchit Karve, and Raj Samani from McAfee Labs have won the Péter Ször Award. The award is given annually for the best piece of technical security research published during the year. Sanchit Karve accepts […]

    The post McAfee Labs Team Wins Péter Ször Award appeared first on McAfee.

Security Advice for Consumers

Tips to protect your home computers, mobile devices, and your family’s complete digital life