Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee Labs

Travnet Trojan Could Be Part of APT Campaign

This blog post was written by Vikas Taneja. Attackers use all kinds of attack vectors to steal sensitive information from...

Mobile Security Security News

Trending: IoT Malware Attacks of 2018

Since January 1st of 2018, a barrage of cyberattacks and data breaches have hit almost every industry, targeting businesses large...

Family Safety Security News

Trends: Adult Cyberbulling is No Laughing Matter

This past year is one for the digital record books. As incredible as it sounds, adults — not those impulsive,...

Internet Security How To Guides and Tutorials

Trick or Treat: Avoid These Spooky Threats This Halloween

Trick or Treat: Avoid These Spooky Threats This Halloween Spooky season is among us, and ghosts and goblins aren’t the only...

McAfee Labs

Trillium Exploit Kit Update Offers ‘Security Tips’

McAfee Labs has previously blogged about the Trillium Exploit Kit Version 3.0, which is commonly used to create and distribute malware....

McAfee Labs

Trillium Toolkit Leads to Widespread Malware

Any aspiring cybercriminal can buy one of many malicious toolkits to craft a downloader and distribute malware. After a time these downloaders...

McAfee Labs

Triton Malware Spearheads Latest Attacks on Industrial Systems

Malware that attacks industrial control systems (ICS), such as the Stuxnet campaign in 2010, is a serious threat. This class of cyber sabotage can spy on, disrupt, or destroy systems that manage large-scale industrial processes. An essential danger in this threat is that it moves from mere digital damage to ...

Family Safety

Trivia Time: Test Your Family’s Password Safety Knowledge

Passwords have become critical tools for every citizen of the digital world. Passwords stand between your family’s gold mine of...

Mobile Security McAfee Labs

Trojan Hides in ROM of Chinese Android Devices

In China, some mobile phone geeks like to refresh their Android machines with images from the Internet. For some mobile...

Internet Security Privacy & Identity Protection

Trojan Turns Computers Into Bitcoin Mining Machines

It has long been known that Bitcoin—the crypto-currency offering users almost completely anonymous transactions online—is the favored currency for the...

McAfee Labs

Trojanized Photo App on Google Play Signs Up Users for Premium Services

Mobile apps usually have names that give some indication of their function. In one recent case, however, we found a...

McAfee Labs

Trojanized Pokémon GO Android App Found in the Wild

Pokémon GO is a new mobile game that allows fans to “catch” Pokemons in the real world using augmented reality...

McAfee Labs

Trojanized Propaganda App Uses Twitter to Infect, Spy on Sympathizers

The Mobile Malware Research Team of McAfee has discovered in recent weeks a number of new threats in the Middle...

Family Safety

Trouble Enforcing Family Tech Rules? Stay on Track with the 4 Cs

Setting and enforcing rules — especially online safety ones — can feel close to impossible at times. But there are...

Internet Security How To Guides and Tutorials

True or Fake News? Know How You Can Separate Truth from Fiction Online

In the good old days, it was very easy to separate truth from fiction. Literature was clearly marked and newspapers...

Internet Security Privacy & Identity Protection

True Security Requires a Holistic Approach

In the eyes of hackers, scammers, and thieves, your online privacy and identity look like a giant jigsaw puzzle. One...

Mobile Security

Trust and Relationships in the Mobile Era

Love is in the air…and, unfortunately, so is betrayal, as people get ready to share their hearts and more via...

McAfee Labs

Trust Is the Most Valuable Asset

The most valuable asset for actors in cyberspace is trust. It is an important ingredient in successful business operations as...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top