Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee Labs

Styx Exploit Kit Takes Advantage of Vulnerabilities

Web-based malware has increased over the last few years due to an abrupt spike in new exploit kits. These kits...

McAfee News Mobile Security

McAfee Hidden Device Admin Detector – Free Protection from Android Malware

A few weeks ago, we told you about Obad, a backdoor Trojan that targets the Android operating system (OS). What...

Internet Security

Internet Browser Cookies: Not What Grandma Used To Make

Imagine you’re surfing the web in search of a new pair of shoes on Zappos.com. You browse the website, look...

Mobile Security

What Master Key? – Android Signature Bypass Vulnerability

Recently, a vulnerability in Android package signature verification was announced by Jeff Forristal, CTO of Bluebox Security. Jeff plans on...

McAfee Labs

New Zero-Day Attack Copies Earlier Flash Exploitation

Late on July 10, Microsoft released a blog post disclosing that they were aware of a zero-day attack in the...

McAfee Labs Mobile Security

Adult Voice-Service Apps on Google Play Japan Charge Users Without Notice

McAfee has reported on increasing fraudulent Android applications on Google Play in Japan this year, including one-click fraud applications and...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

Before You Share, Ask Yourself “Is This TMI?”

Social networks and new online services make it easy to share the details of our lives, perhaps too easily. With...

Family Safety

Helping Kids Understand Their ‘Digital Footprint’

It’s easy to talk in general about an important topic and apply a catchy phrase to it without our kids...

McAfee Labs

Malware Manipulates Procedure Prologue and Epilogue to Evade Security

Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers,...

Family Safety

Q&A: What is ‘Path’ and Is It Safe for My Child?

Q: I overheard my son telling his friend to message him on Path. What is Path and should I be...

Mobile Security

Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors

Nothing in life is free, and that’s especially true when it comes to mobile apps. Thousands of free apps are...

McAfee Labs Mobile Security

Android Master-Key Malware Already Blocked by McAfee Mobile Security

The Android Master Key vulnerability, which was first reported by BlueBox Security, has been big news this month. McAfee explained...

Family Safety

5 (Kind) Reminders for Overly Nosy Parents

Last night I sat next to my teenage son as he played video games. It did not take long before...

McAfee Labs Mobile Security

Introducing App Reputation for Android Apps

McAfee has always been in the forefront of finding new ways to secure our customers against threats and risks posed...

Mobile Security Family Safety

Cheating and Bullying: It’s a Bigger Problem than You Think!

The whole purpose of your “youth” is to grow and learn. It’s time to take in lots of information, so...

McAfee Labs Mobile Security

Japanese One-Click Scammers Abuse Mobile Traffic Exchange Service

McAfee has been monitoring and reporting extensively on one-click-fraud malware for Android in Japan this year. These attacks, primarily on...

McAfee Labs

Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code

Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware...

McAfee Labs

Java Back Door Acts as Bot

The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found...

McAfee Labs

Android App Contains Windows Worm

When developers are unaware of security they open the door to threats against their customers and users. We are not...

Mobile Security

Spy? Where? Mobile Spyware Hiding Right Under Your Nose

Some days it feels like the whole world is going mobile. We tweet, we text, we browse the world from...

Privacy & Identity Protection Family Safety

What Are the Risks of Geo-Location?

Using your mobile’s built-in global positioning system (GPS) functionality allows location-based services (or geo-location) to locate and publish information about...

Internet Security Mobile Security

BYOD: Balancing Convenience and Security

It lies next to you as you sleep, comes with you to work, rides home with you in your car...

Internet Security Security News

Don’t Take a Bite out of that Apple Gift Card Scam

Good rule of thumb on the web: When it seems too good to be true, it probably is. Those ads...

Internet Security Privacy & Identity Protection

Bitcoin Headlines Attract Malware Developers

Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate. In the second quarter of...

Mobile Security

Mobile Bankers Beware: A New Phishing Scam Wants Your Money

As a growing number of smartphone owners get increasingly comfortable using their mobile devices for everything from shopping online to...

How To Guides and Tutorials Mobile Security

1-2-3: How to take a screen shot on your computer or mobile phone

There are some simple moves online that can save you an enormous amount of time. And when it comes to...

McAfee Labs

Cidox Trojan Spoofs HTTP Host Header to Avoid Detection

Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top