McAfee Security Awareness

McAfee Labs Contributes to Verizon 2014 Data Breach Investigations Report

Read the Report

Estimating the Global Cost of Cybercrime


Learn More

Incident response starts with planning. How does your organization stack up?


Learn More

Security Tips

From text message spam on smartphones to new malware that hijacks and locks down computers, Internet threats are continually evolving. Learn how the latest online threats operate and the key steps you can take to protect your email, network, and business.

How Cybercriminals Target Social Media Accounts

Cybercriminals are targeting social media users’ accounts now more than ever.

Infographic: How Confident Are Online Consumers?

This infographic looks at consumer attitudes toward shopping online and outlines how a security breach or the lack of a visible security policy or indicator can change a consumer’s decision to do business on a website, directly impacting an online merchant’s sales conversions.

Five Ways to Mitigate a Big-Scale Attack

Malicious attacks — where the only goal is to cause as much damage as possible — are expected to grow in 2013. Here are five key tips for enterprises to help mitigate the impact of these attacks aimed at breaching database and network security.


Threat Trends

Whether you are a security professional or simply looking to learn more about online threats, McAfee researchers will guide you through the current threat landscape. Our analysis helps you understand overall threat trends, how malware and Internet threats are evolving, and which devices and payloads cybercriminals are targeting — key insights that can help you protect your business.

Infographic: McAfee Labs Threats Report — August 2014

The McAfee Labs Threats Report: August 2014 details the Heartbleed aftermath, results of the McAfee Phishing Quiz, and the results from Operation Tovar.

Flappy Bird Clones Help Mobile Malware Rates Soar

A rise in the number of malicious Flappy Bird game clones has increased the risk of mobile device data theft.

Mobile Malware Continues to Thrive

As mobile malware attacks become increasingly advanced, users need to implement stronger and smarter security techniques.

Threats A-Z
Infographic: McAfee Labs Threats Report — August 2014

McAfee Labs Blog

Join the Conversation Next Page

  • Top 3 Phishing Attacks Use Similar Tricks
    Mohammed Mohsin Dalla - septembre 16, 2014

    Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing scams that attempt to steal your web mail credentials. Web Mail Scam This scam starts with an email that appears to come from Administrator or Helpdesk and requests that you validate or update your account. […]

    The post Top 3 Phishing Attacks Use Similar Tricks appeared first on McAfee.

Security Advice for Consumers

Tips to protect your home computers, mobile devices, and your family’s complete digital life