Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Homes, Not Just Devices: The New Consumer Cybersecurity

Over the last year, our relationship with digital technology has changed completely, and probably irrevocably. The pandemic has been bruising in many different ways, but it has been clear from the very start how important the internet has been as a tool to help us through it. Even just a ...

McAfee Labs

McAfee Labs Report Highlights Ransomware Threats

The McAfee Advanced Threat Research team today published the McAfee Labs Threats Report: June 2021. In this edition we introduce additional context into the biggest stories dominating the year thus far including recent ransomware attacks. While the topic itself is not new, there is no question that the threat is ...

Consumer Cyber Awareness

Watch Out for These 3 Online Job Scams

If you recently found yourself looking for a new job, you are far from alone. According to the Institute of Labor Economics, more Canadians were seeking new employment opportunities at the height of the pandemic than during the previous three recessions combined. Job hunters only used to have to worry about the clarity of their cover letters ...

Executive Perspectives

Restricting Supplier Choice Isn’t an Option to Enhance Digital Sovereignty

Digital sovereignty and strategic autonomy are phrases that are used almost daily in EU policy circles, loosely framed around the EU’s ability to carve out its own future in the digital sphere, rather than having its terms dictated from abroad. To achieve digital sovereignty in practice, having access to as ...

Consumer Cyber Awareness

Do the Benefits of Bitcoin Outweigh the Risks?

What do Burger King and the popular “Doge” meme have in common? They both have cryptocurrencies named after their likeliness. WhopperCoin and Dogecoin are just two examples of the thousands of types of cryptocurrencies that have caught users’ attention over the past few years. Cryptocurrencies are digital tokens generated by a computer after solving ...

Mobile and IoT Security

7 Tips to Protect Your Smartphone from Getting Hacked

There’s little rest for your hard-working smartphone. If you’re like many professionals today, you use it for work, play, and a mix of personal business in between. Now, what if something went wrong with that phone, like loss or theft? Worse yet, what if your smartphone got hacked? Let’s try and keep that from happening to you.  Globally, plenty ...


Was ist ein Proxy-Server?

Jedes Mal, wenn Sie eine Webseite besuchen, dann senden Sie eine IP-Adresse mit, die den Sender identifiziert. Durch das Aufrufen der Internetseite wird eine Anfrage an einen Zielserver gestellt, der die Ergebnisse an Sie zurück übermittelt. Was ein Proxy-Server ist, ist nun nichts anderes, als eine dazwischen geschaltete Kommunikationsschnittstelle. Die ...


Transforming to a Predictive Cyber Defense

How much of the global economy is managed from a home network these days? Or, more importantly, what percentage of your company’s most sensitive data passes through employee home networks right now? If you’re like me, working from a home office, you can’t help but think about all of the ...


Qu’est-ce que le dark web ?

Le dark web, c’est quoi exactement ? Vous en avez forcément entendu parler dans un film ou dans un documentaire, et vous vous êtes donc posé la question « qu’est-ce que le dark net » ? Le dark web, ou dark net, c’est la partie d’Internet à laquelle on ne peut accéder ...

Security Operations

Testing to Ensure Your Security Posture Never Slouches

How well can you predict, prevent and respond to ever-changing cyberthreats? How do you know that your security efforts measure up? The stakes are high if this is difficult to answer and track.  Imagine if you had one place where you found a comprehensive real time security posture that tells ...

Subscribe to McAfee Securing Tomorrow Blogs