Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security Privacy & Identity Protection

What is a Rootkit?

A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit...

Internet Security Privacy & Identity Protection

What is a Remote Administration Tool (RAT)?

Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I...

Internet Security Privacy & Identity Protection

What is a Potentially Unwanted Program (PUP)?

Whether you’re an animal person or not, you have to admit that puppies are pretty darn cute. So cute that...

How To Guides and Tutorials

What Is a Password Manager?

Many of us rely on passwords to secure our digital devices and online accounts, from our personal computers and mobile...

Life at McAfee

What is a McAfee Internship Like? 10 Interns Share Perspectives

At McAfee, we foster meaningful internship experiences within our fast-paced world of cybersecurity.  We know it’s the next generation that will build tomorrow’s technology solutions. McAfee interns make substantial contributions and are valued as global team members, joining our...

Internet Security Family Safety

What is a Man-in-the-Middle Attack?

There’s a reason why most people feel uncomfortable about the idea of someone eavesdropping on them—the eavesdropper could possibly overhear...

Internet Security Family Safety

What is a Keylogger?

Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every...

Internet Security Privacy & Identity Protection

What is a Hacker?

You probably think you know what a “hacker” is, but the images portrayed in the media can be misleading. You...

Internet Security Family Safety

What is a Firewall?

Most of us may have heard the term, and know it’s related to security in some way, but do you...

Internet Security Privacy & Identity Protection

What is a Denial-of-Service Attack?

You may have heard news reports about popular websites such as CNN, Amazon and Yahoo! being taken down by a...

How To Guides and Tutorials Internet Security

What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes

What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes Imagine you’re driving down a highway...

How To Guides and Tutorials

What Is a Data Broker?

A data broker is an organization that makes money by collecting your personal information, analyzing it, and licensing it out to...

How To Guides and Tutorials

What Is a Data Breach and How Do You Avoid It?

A data breach occurs when cybercriminals steal information from an organization’s database without permission from the owner or administrator. Data...

Internet Security

What Is a Crypto Wallet and How to Keep Your Wallet Secure?

A-list celebrities and social media influencers are now adding their voices to the roar of other cryptocurrency fans asking you...

Internet Security Privacy & Identity Protection

What is a Cache?

Perhaps someone has told you that you need to “clear your cache,” but what does this mean and why should...

Internet Security

What is a Botnet? And What Does It Have to Do with Protecting “Smart Home” Devices?

The pop-up toaster as we know it first hit the shelves in 1926, under the brand name “Toastmaster.” With a...

Internet Security Privacy & Identity Protection

What Is a Botnet?

What is a botnet? And what does it have to do with a toaster? We’ll get to that. First, a...

Privacy & Identity Protection

What is a Botnet?

The word botnet or bot is short for robot network.  A botnet is a group of Internet-connected personal computers that...

Internet Security Privacy & Identity Protection

What is a Backdoor Threat?

Did you accidentally leave the back door open? This thought can be scary because you know that leaving the back...

Family Safety

What Families Can Learn from the #HisNameIsCayden Hashtag

A recent Facebook post that went viral cost an Atlanta man his job and opened an important conversation for families around...

Internet Security

What Everyone Can Learn from The Mark Zuckerberg Hack

When we were children, our role models seemed invincible. Could any five-year-old imagine a Superman who was less than perfect?...

Family Safety

What Else Kids Give Away When They Share Their Personal Passwords

Tweens and teens share clothes, secrets, and homework notes but there’s something else your kids may be sharing that isn’t...

McAfee Labs

What Drives a Ransomware Criminal? CoinVault Developers Convicted

How often do we get a chance to learn what goes on in the minds of cybercriminals? Two members of...

How To Guides and Tutorials Internet Security

What Does “Connection is Not Private” Mean?

Have you ever visited a site that triggers a “your connection is not private” or “your connection is not secure”...

Privacy & Identity Protection

What Does Your Password Say About Your Preferences?

Passwords say a lot about us. They speak to what we prioritize, what we hold dear. So when I recently saw my wife’s password included...

Internet Security Family Safety

What Does It Take To Be Digitally Secure?

It’s no longer possible to deny that your life in the physical world and your digital life are one and...

Family Safety

What Do Your Kids Want To Be When They Grow Up?

When I was 8, I was completely obsessed with being an air hostess ‘when I grew up.’ The thought of travelling the...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top