Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Mobile Security Family Safety

BeReal – The Newest Kid On The Social Media Block

Without doubt, the biggest criticism we all have of social media is that everyone always looks fabulous! And while we...

Life at McAfee

Best Practices for Adapting to a Remote Work Lifestyle 

As our world continues to evolve, we have been forced to adapt accordingly. Navigating change can be difficult for many, so...

McAfee Labs

Best practices for preventing Dridex infections

Mitigating the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of...

Privacy & Identity Protection Mobile Security

Best Smart Home Devices for a Connected New Year

 Like many of you, I spent a lot of time at home this year, but it came with an unexpected...

How To Guides and Tutorials

Best Ways to Check for a Trojan on Your PC

In this guide, we will take a closer look at how you can detect Trojans on your computer, and share ways to detect and remove them.

Family Safety

Beware Cloned Facebook Profiles

If you have had a Facebook friend request from a friend that you are sure you already have then –...

Family Safety

Beware of Back-To-School Scams

These days it seems that there is a scam for every season, and back-to-school is no different. From phony financial...

How To Guides and Tutorials Mobile Security

Beware of BRATA: How to Avoid Android Malware Attack

Cybercriminals go to great lengths to hack personal devices to gather sensitive information about online users. To be more effective, they make significant investments in their technology. Also, cybercriminals are...

Mobile Security McAfee Labs

Beware of Impostor Android Apps Using Fake ID

Recently discovered, an Android vulnerability called Fake ID allows apps to impersonate other apps by copying their identity. Each app...

Privacy & Identity Protection Mobile Security

Beware of Malicious Mobile Apps

With the surge in the usage of mobile phones, there has been a concurrent increase in malicious activities targeting these devices. One common technique used by hackers is to corrupt legitimate applications. Android devices, in particular, see increases in malware targeting mobile phones year by year.

Internet Security Mobile Security

Beware of Social Media Scams

Social media is a great place to connect with friends and family. Unfortunately, it is also a great place for...

Privacy & Identity Protection Family Safety

Beware of the Risks of Online Gaming and Fantasy Football

August may mean the last days of summer vacation and start of back to school for some, but for die...

Internet Security

Beware of These Voting Scams Happening Now

With the election quickly approaching, it’s essential to be informed and cautious about the growing number of voting scams. Scammers...

McAfee Labs

Beware the Rapid Proliferation of Cyber-warfare Capabilities

Governments across the globe continue to invest in cyber warfare operations.   Over 60 countries, a number that is rising, currently...

Internet Security Mobile Security

Beware: Zombie IoT Botnets

The ghosts and ghouls of October have come and gone, but the dangers lurking behind virtual walls have hardly disappeared....

McAfee Labs

Beyond Clubhouse: Vulnerable Agora SDKs Still in Widespread Use

On February 17th, 2021, McAfee disclosed findings based on a 10-month long disclosure process with major video conferencing vendor Agora,...

McAfee Labs

Big, Hard-to-Solve Problems

Improving the Lifecycle of Threat Defense Effectiveness When a new security tool or technique is released, Version 1.0 is usually...

McAfee Labs

Bing.VC Hijacks Browsers Using Legitimate Applications

Browser hijackers are a type of malware that modifies a web browser’s settings without the user’s permission. Generally a browser hijacker...

Internet Security Privacy & Identity Protection

Bitcoin Headlines Attract Malware Developers

Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate. In the second quarter of...

McAfee Labs

Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code

Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware...

Internet Security Privacy & Identity Protection

Bitcoin Security: Mining Threats You Need to Know

Bitcoin security risks are a cryptocurrency reality. Learn more about bitcoin mining safety and how to protect your devices.

Privacy & Identity Protection

Black Friday and Cyber Monday Scams: Beware of the Pitfalls

With the shopping bonanzas of Black Friday and Cyber Monday comes a flurry of deals and offers, some of which are too good to be true. Unfortunately, the latter instances often become scams run by fraudsters seeking to take advantage of the shopping frenzy.

Internet Security Privacy & Identity Protection

Black Friday and Holiday Shopping Dangers

This blog was written by Bruce Snell. As a kid, I remember hearing about the horror stories of the insanity...

How To Guides and Tutorials Security News Internet Security Mobile Security

Black or Scrambled Phone Screen? Here’s How to Spot a Hacked vs Broken Phone

It’s the screen you never want to see. Something is seriously wrong with your phone. Or is it? You might...

Internet Security Privacy & Identity Protection

Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own

Director Michael Mann’s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity...

Internet Security Privacy & Identity Protection

Blockchain 101: What Consumers Need to Know About the Technology

From Bitcoin’s boom, to high stakes hacks – cryptocurrency, and how to secure it, has been the talk of the...

Internet Security

Blockchain Basics: What’s Blockchain Technology and How Might It Change Our Lives?

What’s blockchain technology? The term gets bandied about often enough, but it doesn’t always get the explanation it deserves.  Understanding...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top