Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security

Convenience vs. Online Security: Have Your Cake and Eat It Too

Convenience vs. Online Security: Have Your Cake and Eat It Too We live in a world where convenience is king....

Internet Security

Consumers want a fully connected life – but at what cost?

Convenience has always, and will always be king. That’s why it’s no surprise that the average person is collecting connected...

Life at McAfee

Conquering Fear at McAfee

By Radhika, Director of Global Consumer Product Marketing. With the U.S. school year beginning, I’ve been in touch with the...

Privacy & Identity Protection Mobile Security

Connect With Confidence: Benefits of Using a Personal VPN 

Protect your digital life  The recent surge in work from home is likely accompanied by a corresponding increase in corporate VPN (virtual private...

Internet Security Privacy & Identity Protection McAfee News

Connected Vacations: Top Takeaways from Our Unplugging Survey

It’s June, which means the sun is shining, schools out, and it’s time for a family summer vacation! Whether you’re...

Internet Security Mobile Security

Connected Relationships: A Love Affair with Technology

Love is in the air, and in our technology as well. At least, that is what the survey says—specifically, a...

How To Guides and Tutorials Internet Security

Connected or Compromised? How to Stay Secure While Using Push Notifications

You’re probably familiar with push notifications – messages sent by app publishers that pop up on your desktop or mobile...

Internet Security Privacy & Identity Protection

Connected Cars: How One Vulnerability Can Turn Cybercriminals into Backseat Drivers

Whether it’s turning the music up a little, or turning down the AC – when you’re in your own car,...

McAfee Labs

Configuring McAfee ENS and VSE to Prevent Macroless Code Execution in Office Apps

Microsoft Office macros are a popular method of distributing malware. Users can defend themselves against macro attacks by disabling macros....

Security News

Concerned by the Security Risk Affecting Popular Services and Apps? Here’s What We Know.

Several security researchers have recently reported a powerful software bug that could potentially affect thousands of popular websites, services, hosted apps, and even game servers—thanks to an apparent flaw that could...

Security News McAfee News

CompuCom Launches Cloud-Based Managed Service Powered by McAfee

This blog was written by Richard Steranka. Today, from Black Hat 2016 in Las Vegas, CompuCom announced the expansion of...

Life at McAfee

Coming Home To Vote for Marriage Equality

By Chris, Localization Engineer Chris is a localization engineer for McAfee in Cork, Ireland, who is passionate about inclusivity for...

Internet Security Family Safety

Combining The Old With The New

Combining The Old With The New “Mom look, that’s the app I was telling you about!” remarked my friend’s teen,...

McAfee Labs

Combating Malware and Advanced Persistent Threats

In the past decade, the security industry has seen a constant rise in the volume of malware and attacks associated...

Family Safety

College Bound? 7 Important Technology Habits for Students

You’ve loved, shaped, and equipped your child to succeed in college and move in day is finally here.  But there’s...

How To Guides and Tutorials Internet Security

College Basketball Finals Shouldn’t Result in March Mayhem: 4 Security Tips to Stay Safe

March is in full swing, which can only mean we’re about to enter the mayhem that is the college basketball...

Internet Security

Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely

If you’re thinking about crypto, one of the first things you’ll want to do is get yourself a good wallet.  ...

McAfee Labs

Code Execution Technique Takes Advantage of Dynamic Data Exchange

Email phishing campaigns are a popular social engineering technique among hackers. The idea is simple: Craft an email that looks...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top