Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security

Webcam Blackmail: How Cybercriminals Breathe Life into Laptops

Stories of inanimate objects coming to life are familiar to us. Movies such as Toy Story show the idea’s cultural...

McAfee Labs

WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency

McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies.

Internet Security

Wedding Planning App Users Hacked Before the Big Day

Say you’re getting married. You and your partner have booked the venue, made the seating arrangements, trained your dog to...

McAfee News

Welcome McAfee Forward—the Future of Online Protection Today

With digital life-changing so rapidly, it’s time for a new way to protect it. Welcome to McAfee Forward—the future of...

McAfee Labs

We’ve Been Hacked! Okay, I’ll Deal With It Next Week

That was the message I got from a CEO when we presented evidence that their organization had been compromised and...

How To Guides and Tutorials Internet Security Family Safety

What About a Heart-To-Heart Talk with Your Loved Ones This Valentine’s Day?

I was listening to the Valentine’s Day playlist of my friend when suddenly espied one of my favorites- Ain’t No...

Internet Security

What are Pig Butchering Scams and How Do They Work?

“Jessica” cost him one million dollars.   In an account to Forbes, one man described how he met “Jessica” online.i Readily,...

How To Guides and Tutorials

What Are Ransomware Attacks? An In-Depth Guide

Ransomware is a malicious type of malware that cybercriminals use to encrypt the target’s files or lock their computer systems,...

Mobile Security

What Are Serverless Apps?

The smartphone market has exploded in recent years, leading to the development of over 4 million mobile apps. For mobile...

How To Guides and Tutorials Privacy & Identity Protection

What Are the 6 Types of Identity Theft

You crack open your credit card statement and something seems … off. Maybe it’s a couple of small online purchases...

Family Safety

What are the Pros and Cons of Snooping on Your Kids Online?

I’ve changed my mind on the snooping question quite a bit since I began writing about family safety over five...

Internet Security

What Are the Risks of Clicking on Malicious Links?

Learn how to spot risky URLs, what to do if you've clicked a phishing link, and essential steps to secure your device and accounts from malware, scams, and identity theft.

Privacy & Identity Protection Family Safety

What Are the Risks of Geo-Location?

Using your mobile’s built-in global positioning system (GPS) functionality allows location-based services (or geo-location) to locate and publish information about...

Internet Security Mobile Security

What CES Can Show Us About Evolving Consumer Security Needs: A Timeline

Appropriately dubbed the ‘Global Stage for Innovation,’ it’s no wonder CES showcases the most cutting-edge consumer technologies coming out in...

Mobile Security Family Safety

What Could (Pokémon) Go Wrong?

This blog was written by Bruce Snell. If you’re like me, your Facebook feed (and Twitter, Instagram, Vine, etc) has...

McAfee Labs

What CVE-2020-0601 Teaches Us About Microsoft’s TLS Certificate Verification Process

By: Jan Schnellbächer and Martin Stecher, McAfee Germany GmbH This week security researches around the world were very busy working...

Privacy & Identity Protection

What Do Social Media Companies Know About You?

What do social media companies really know about you? It’s a fair question. And the quick answer is this: the more you...

Family Safety

What Do Your Kids Want To Be When They Grow Up?

When I was 8, I was completely obsessed with being an air hostess ‘when I grew up.’ The thought of travelling the...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top