Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security McAfee News Security News

What MWC 2019 Shows Us About the Future of Connectivity

The time has come to say goodbye to Barcelona as we wrap up our time here at Mobile World Congress...

Mobile Security

What Mobile Users Should Know About Heartbleed: Free McAfee Android App

By now, you have probably heard about the Heartbleed bug, estimated to affect up to two-thirds of all websites using...

Mobile Security

What Master Key? – Android Signature Bypass Vulnerability

Recently, a vulnerability in Android package signature verification was announced by Jeff Forristal, CTO of Bluebox Security. Jeff plans on...

Family Safety Privacy & Identity Protection

What Makes My Passwords Vulnerable?

Passwords serve as the first line of defense against unauthorized access to our online accounts, be it email, social media, banking, or other sensitive platforms. Let's explore the common techniques for cracking passwords, and learn how to stay one step ahead in the ongoing battle for online security.

Family Safety

What Leads a Child to Connect with Strangers Online?

At a recent ladies’ get-together, discussion about the murky world of online grooming, cyber stalking, and identity thieves found its...

Life at McAfee

What I’m Thankful for This Year: Combining Passion & Career

By Philip, Program Manager, People First Office Back in April, I started my new role at McAfee as the Program...

Internet Security Mobile Security

What It Takes for Security in the Internet of Things

The next time you buy a car, chances are, it’ll be connected to your phone. Maybe your next refrigerator, thermostat,...

Internet Security Privacy & Identity Protection

What Is the CurveBall Bug? Here’s What You Need to Know 

Today, it was announced that researchers published proof of concept code (essentially, an exercise to determine if an idea is a reality) that exploits a recently patched vulnerability in...

Internet Security

What is ‘Covert Redirect’ and Should You be Worried?

When Heartbleed struck in April, it shook the Internet to its core in an almost literal sense: the vulnerability, which...

Internet Security Privacy & Identity Protection

What is Wardriving?

Wireless networks have certainly brought a lot of convenience to our lives, allowing us to work and surf from almost...

Internet Security Family Safety

What is Typosquatting?

Typosquatting, also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright)...

Internet Security How To Guides and Tutorials

What is the Dark Web? Everything You Need to Know

You open up your laptop and check the daily news. You see a headline stating that one of your favorite online retailers was breached and that thousands of...

Privacy & Identity Protection

What is the Dark Web?

The dark web. The name raises all kinds of questions. What is the dark web, really? Where is it? Can...

Internet Security Privacy & Identity Protection

What is the Cloud?

You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe...

Internet Security

What Is Synthetic Identity Theft?

It’s too bad cybercriminals don’t funnel their creativity into productive pursuits because they’re constantly coming up with nefarious new ways...

Privacy & Identity Protection

What is Spyware?

Spyware. If the name sounds creepy and invasive, that’s because it is.  The thought of someone virtually looking over your...

Internet Security Privacy & Identity Protection

What is Spam?

Everyone’s heard of spam as it pertains to emails. Spam isn’t necessarily a malicious message designed to trick you into...

Internet Security

What is Sora and What Does It Mean for Your Personal Internet Security?

Imagine a tool that can transform text into captivating videos, bridging the gap between imagination and reality by creating videos...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top