Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Mobile Security

4 Mobile Malware Threats You Can’t Even See

By 2030, experts predict that there will be 5 billion devices connected to 5G.1 For the general population, this connectedness...

Mobile Security

Mobile Spyware: How Hackers Can Turn Your Phone Into a Stalking Machine

Some crooks and shady characters will invade your privacy simply by asking for your permission to snoop—through invasive apps you...

How To Guides and Tutorials Mobile Security Family Safety

How Do Hackers Hack Phones and How Can I Prevent It?

The threat of having your phone hacked has become a common fear. The truth is that it is possible to hack any phone. With the advancement of technology, where discovery of knowledge and information advances the understanding of technology, hackers are able to hack even the most sophisticated phone software. ...

Internet Security Privacy & Identity Protection

Why Should I Pay for Online Protection?

We all love free stuff. (Costco samples, anyone?) However, when it comes to your family’s security, do free online protection tools offer the coverage...

Mobile Security Privacy & Identity Protection

What Should I do If My Phone Gets Stolen or Lost?

Before your phone gets lost or stolen, put some basic steps in place. You’ll want to act quickly, so preparation...

Mobile Security

The Top 5 Scariest Mobile Threats

Scary movies are great. Scary mobile threats, not so much.  Ghosts, killer clowns, and the creatures can stir up all...

How To Guides and Tutorials Mobile Security

How To Tell If Your Smartphone Has Been Hacked

It takes a bit of effort, but iPhones can wind up with viruses and malware. And that can indeed lead...

Internet Security

Oh what a difference an “o” can make!

I don’t know about you, but I love Christmas in Australia, long summer days, the sound of cicadas at night,...

McAfee Labs

"Operation Aurora" Leading to Other Threats

Operation Aurora has received a lot of attention over the past couple of days.  To recap, Google, Adobe, and many...

Family Safety

McAfee, Parental Controls, and Apple Devices = Safer Kids Online

Today we announced our McAfee® Family Protection iPhone®, iPod touch® and iPad™ Edition. McAfee now provides strong parental controls to...

McAfee Labs

Remote Jackpot: Hacking ATMs

Isn’t it just everybody’s dream: to walk up to an ATM, swipe your card, get a flashy screen reading “We...

McAfee Labs

Stuxnet Update

Stuxnet has received a lot of attention since McAfee first blogged about it in July. This post will answer some of...

Internet Security McAfee News

Security Connected by the McAfee Channel (by Alex Thurber)

As part of the Mcafee Security Connected initiative launched at FOCUS10, we announced McAfee Security Management 5, which provides a unified monitoring, management, and reporting system that scales to any-sized organization and ensures all endpoints, networks and content are secure.

McAfee Labs

The Riskiest Web Domains Revealed – Mapping The Malweb

The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to our fourth annual Mapping the Mal...

Family Safety Privacy & Identity Protection

IRS Fully Reliant on Social Security Numbers

On the Policy, Practice & Procedures page of their website, the IRS addresses the public’s concern regarding Social Security numbers...

McAfee Labs

Missing Hotel Room Key? Try Your Phone

If you are like me, there are times when you will misplace your hotel key. Times when you’re switching a...

Privacy & Identity Protection

Hacking Wireless for Identity Theft

The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives....

McAfee Labs

Xirtem Worm Hides in CAB/SFX Files

W32/Xirtem@@MM is a fast-spreading and active worm, discovered in late 2008, that uses a variety of methods to propagate. The...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top