Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security How To Guides and Tutorials Family Safety

15 Tips To Better Password Security

Protect your information by creating a secure password that makes sense to you, but not to others. Most people don’t...

Family Safety

Apps to Stop You (Adults!) from Texting and Driving

She was texting and driving when she hit my kid. No, it wasn’t a careless teenager or a group of...

McAfee Labs

New Exploit of Sandworm Zero-Day Could Bypass Official Patch

Update of October 25: Some comments posted after we published this report suggest that our proof-of-concept exploit will trigger the...

McAfee Labs

Cerber Ransomware Updates Configuration File

This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the...

Mobile Security

So You Think Your Phone Is Hacked—Here’s What to Do

Humans are private by nature. We may share an inspiring article or photos from a fun trip, but we keep...

McAfee Labs

Further Analysis of WannaCry Ransomware

McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its...

McAfee Labs

Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack

This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...

Internet Security

Netflix Users: Don’t Get Hooked by This Tricky Phishing Email

If you own a smart TV, or even just a computer, it’s likely you have a Netflix account. The streaming...

Internet Security How To Guides and Tutorials Mobile Security

Cybercriminal Speaks With Child via Hacked Smart Camera: How You Can Stay Protected

IoT devices enter our homes out of ease and convenience, as the gadgets often optimize or streamline ordinary tasks —...

McAfee Labs

Remote iPhone Jailbreak Using PDF Exploit Should Serve as Wake-Up Call

Like many iPhone users, I “jailbreak” my iPhone. I do this for many reasons, but mainly for console-level access and...

Family Safety

Are Your Kids Using Vault Apps to Hide Photos, Chats, or Videos?

A number of apps for both the Android and iPhone exist that are great for storing your personal “gems,” those...

Mobile Security

Obad.a – What You Need to Know About the Latest Android Threat

With the convenience of our mobile apps, we increasingly rely on our phones for work and play.  But did you...

McAfee Labs

Product Coverage and Mitigation for CVE-2014-1761 (Microsoft Word)

On March 24, Microsoft released Security Advisory 2953095 for Microsoft Word. In-the-wild exploitation of this vulnerability has been observed across...

McAfee Labs

Product Coverage and Mitigation for CVE-2014-1776 (Microsoft Internet Explorer)

On April 26, Microsoft released Security Advisory 2963983 for Microsoft Internet Explorer. In-the-wild exploitation of this vulnerability has been observed...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Spot and Protect Yourself from Fake Antivirus Software

Most of you know how important it is to have security software on your computers to stay protected from viruses, malware,...

Family Safety

Teen Hashtags: What Every Parent Ought to Know

Hashtags have become a normal part of everyday vernacular thanks to social media. By simply putting a pound (#) sign...

Mobile Security McAfee Labs

Beware of Impostor Android Apps Using Fake ID

Recently discovered, an Android vulnerability called Fake ID allows apps to impersonate other apps by copying their identity. Each app...

McAfee Labs

At McAfee, Protecting Customers Takes Precedence Over Seeking Headlines

One question I often hear is “When will McAfee publish a report on the latest threat?” It seems to be...

How To Guides and Tutorials Family Safety

How to Report an Online Scam

For many online consumers, money (or the power of it) hovers quietly and invisibly over an online shopping cart only...

McAfee Labs

Malware Mystery: JS/Nemucod Downloads Legitimate Installer

JS/Nemucod is the detection name given to a family of malicious JavaScript downloaders that have appeared in spam campaigns since last year....

McAfee Labs

Microsoft’s June Patch Kills Potential CFG Bypass

After applying Microsoft’s June patch, we noticed some interesting changes that prevent a security bypass of Windows’ Control Flow Guard...

Internet Security Family Safety Security News

No More Ransom: A New Initiative to Battle Ransomware

This blog was written by Bruce Snell. Ransomware has seen a huge increase over the past couple of years.  According...

Life at McAfee

Everyday Hero: 5 Questions with McAfee Labs’ Paula Greve

iWith cybersecurity experts taking center stage this week at the Black Hat conference in Las Vegas, the world is watching...

How To Guides and Tutorials Mobile Security

5 Tips for Avoiding Android Malware

The ubiquity of mobile phones has created a unique opportunity for cybercriminals. They now have a way of accessing both...

McAfee Labs

McAfee AMSI Integration Protects Against Malicious Scripts

This blog describes how the AMSI (Antimalware Scan Interface) is used within the various McAfee products, and highlights some of the malware we are able to detect with it.

Internet Security Privacy & Identity Protection

What Is the CurveBall Bug? Here’s What You Need to Know 

Today, it was announced that researchers published proof of concept code (essentially, an exercise to determine if an idea is a reality) that exploits a recently patched vulnerability in...

Family Safety

Why Taking Your Teen’s Phone Away Doesn’t Work Anymore

If you are the parent of a tween or teen, you know the challenge of setting and following through with consequences. If you are like many parents, your first instinct is to restrict the thing they love the most, which is communication with their peers and the dependence they have ...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top