Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee Labs

The Rise of Backdoor-FCKQ (CTB-Locker)

By Raj Samani (@Raj_Samani) and Christiaan Beek (@ChristiaanBeek) In the McAfee Labs Threats Report published in November 2014, Senior Vice...

McAfee Labs

The Rise of Deep Learning for Detection and Classification of Malware

Co-written by Catherine Huang, Ph.D. and Abhishek Karnik  Artificial Intelligence (AI) continues to evolve and has made huge progress over the last decade. AI shapes our daily lives. Deep learning is a subset of techniques in AI that...

Internet Security

The Rise of the Dark Web Gig Economy

The gig economy has become more prevalent in today’s world with the appeal and necessity of flexible work opportunities. Many...

McAfee Labs

The Rising Trend of OneNote Documents for Malware delivery

Authored By Anandeshwar Unnikrishnan,Sakshi Jaiswal,Anuradha M  McAfee Labs has recently observed a new Malware campaign which used malicious OneNote documents...

McAfee Labs

The Riskiest Web Domains Revealed – Mapping The Malweb

The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to our fourth annual Mapping the Mal...

Family Safety Privacy & Identity Protection

The Risks of Public Wi-Fi and How to Close the Security Gap

As I write this blog post, I’m digitally exposed, and I know it. For the past week, I’ve had to...

Internet Security Privacy & Identity Protection

The Role Partners Play in the Cyberskills Shortage

This blog was written by Richard Steranka. Last week, McAfee launched the Hacking the Skills Shortage Report in partnership with...

McAfee Labs

The Scam Strikes Back: Exploiting the CrowdStrike Outage

Authored by Lakshya Mathur, Vallabh Chole & Abhishek Karnik Recently we witnessed one of the most significant IT disruptions in...

Internet Security Mobile Security

The Search for Celebrity Gossip Could Land Your Phone in Hot Water

They may be glamorous, but celebrities can make things quite ugly when it comes to the safety of your mobile...

McAfee Labs

The Season of Back to School Scams

Authored by: Lakshya Mathur and Yashvi Shah  As the Back-to-School season approaches, scammers are taking advantage of the opportunity to...

Family Safety

The Secret Tumblr Craze and What Parents Need to Know

Your kids have all but vanished from Facebook and their Instagram postings are becoming more and more sporadic. If this...

Internet Security

The Seven Main Phishing Lures of Cybercriminals

One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at...

Internet Security Privacy & Identity Protection

The Smart Home is Coming. Are We Ready for It?

If there’s one topic that has the security community excited, and hopeful at the same time, it’s the Internet of...

Internet Security

The Smart Home Security Guide

The expansion of smart home devices in our households is remarkable, with nearly everything from our lights to our laundry...

Internet Security How To Guides and Tutorials Mobile Security

The Spotify Phishing Scam: How to Reel in This Cyberthreat

Many music-lovers around the world use Spotify to stream all of their favorite tunes. While the music streaming platform is...

Internet Security Mobile Security

The SS7 Flaw: What it is, and How Hackers Abuse It

Users don’t always have it easy when it comes to online security. Beyond the plethora of passwords, usernames, security questions...

McAfee Labs

The Stealthy Stalker: Remcos RAT

Authored By Sakshi Jaiswal, Anuradha M In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat....

Internet Security Security News

The Surprisingly Simple Google Maps Attack That Shut Down a Business

Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need to do to...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top