Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security Family Safety

What is Malware?

What is malware? A dictionary-like definition is “malicious software that attacks computers, smartphones, and other connected devices.” In fact, “malware”...

McAfee Labs

Mobile NFC Features Raise Security Concerns

Yesterday, at the Web 2.0 Summit, Google’s CEO Eric Schmidt presented the Nexus S. This wasn’t just about a new...

McAfee Labs

Android Malware Spreads Through QR Code

Last week, there was quite a buzz in the mobile-malware researchers community about a new Android malware. It came to...

McAfee Labs

Networked Printers at Risk

Multifunction printers (MFPs) have been common in offices for years. They let employees print, scan, and copy documents. Two separate talks...

Internet Security Security News McAfee News

2012 Online Safety Survey – Majority Of Americans Do Not Feel Completely Safe Online

From tweens and teens to silver surfers, more people are jumping onto multiple Internet connected devices every day.  It’s very...

Mobile Security

‘FakeInstaller’ Leads the Attack on Android Phones

Android.FakeInstaller is a widespread mobile malware family. It has spoofed the Olympic Games Results App, Skype, Flash Player, Opera and...

Mobile Security Family Safety Privacy & Identity Protection

10 Tips to Safe Online Shopping

How times have changed. I can remember when Christmas didn’t start until after Thanksgiving—not before Halloween as we see things...

Mobile Security

App Lock: The Security System for Unprotected Mobile Apps

Lock: To fasten, to make secure, to confine or exclude by. To fix in place so that movement or escape...

McAfee Labs

Red Kit an Emerging Exploit Pack

Exploit kits are toolkits that are used to build malware components such as binaries and scripts. They automate the exploitation...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top