McAfee Security Awareness

Tackling Attack Detection and Incident Response

Discover the key factors that slow many organizations’ incident response rates.

Read ESG Report

Lucrative Ransomware Attacks

Analysis of the CryptoWall version 3 threat

Read Report

When Minutes Count

How experts fight advanced threats with real-time SIEM and identification of eight key indicators of attack

Read Report

Security Tips

From text message spam on smartphones to new malware that hijacks and locks down computers, Internet threats are continually evolving. Learn how the latest online threats operate and the key steps you can take to protect your email, network, and business.

How Cybercriminals Target Social Media Accounts

Cybercriminals are targeting social media users’ accounts now more than ever.

Infographic: How Confident Are Online Consumers?

This infographic looks at consumer attitudes toward shopping online and outlines how a security breach or the lack of a visible security policy or indicator can change a consumer’s decision to do business on a website, directly impacting an online merchant’s sales conversions.

Five Ways to Mitigate a Big-Scale Attack

Malicious attacks — where the only goal is to cause as much damage as possible — are expected to grow in 2013. Here are five key tips for enterprises to help mitigate the impact of these attacks aimed at breaching database and network security.

Threat Trends

Whether you are a security professional or simply looking to learn more about online threats, McAfee researchers will guide you through the current threat landscape. Our analysis helps you understand overall threat trends, how malware and Internet threats are evolving, and which devices and payloads cybercriminals are targeting — key insights that can help you protect your business.

McAfee Labs 2016 Threats Predictions

This report includes two distinct views of the future: First, we look forward five years and predict how the cyber threat landscape will change and the security industry’s likely response. Then, we look tactically at 2016 and make specific predictions about expected threat activity.

Lucrative Ransomware Attacks: Analysis of the CryptoWall Version 3 Threat

This is the first published report using combined threat research and intelligence from the Cyber Threat Alliance founding and contributing members, including Intel Security. It provides organizations with valuable insights into the CryptoWall Version 3 lifecycle and current proliferation, as well as tools for prevention and mitigation.

The Hidden Data Economy

This report details a few of the many ways in which cyber thieves monetize the information they have stolen.

Threats A-Z: Security defined and simplified

Learn More

McAfee Labs 2016 Threats Predictions

View Infographic

A five-year threats forecast

View Infographic

McAfee Labs Blog

Join the Conversation Next Page

  • Overcoming Targeted Attacks: A New Approach
    Prabhat Singh - November 30, 2015

    Successful targeted attacks bypass security controls and typically cause significant damage to an enterprise. Damages may include reputation, monetary, and intellectual property losses. Many attacks leverage zero-day malware, which are malicious programs that security scanners miss on the day they are used for the first time. Several approaches are commonly used to combat targeted attacks, […]

    The post Overcoming Targeted Attacks: A New Approach appeared first on McAfee.

Security Advice for Consumers

Tips to protect your home computers, mobile devices, and your family’s complete digital life