Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee Labs

Analyzing KillDisk Ransomware, Part 1: Whitelisting

This blog post was written by Sudhanshu Dubey. At McAfee Labs we recently analyzed the ransomware KillDisk. We will share...

Security News Family Safety

Trends: Adult Cyberbulling is No Laughing Matter

This past year is one for the digital record books. As incredible as it sounds, adults — not those impulsive,...

McAfee Labs

Spotlight on Shamoon

Our analysis this month has pointed to Shamoon emerging in the Middle East. We have recently seen a number of...

Internet Security Mobile Security

How To Protect Today’s Smart Home

We love our kids, and we want the best for them. In today’s connected world, the role of a parent...

Family Safety

Helping Teens Rethink the Sexy Selfie

You just can’t make this stuff up. Who would have thought we’d be spending a chunk of our parenting years...

How To Guides and Tutorials Internet Security

Online Shopping Festivals – Things to Do Before Clicking on Add to Cart

Online sales are a huge rage these days! E-commerce firms are competing with each other to offer consumers the best...

Privacy & Identity Protection Mobile Security

So, Your Phone Got Stolen. Here’s What to Do.

The Coachella Music and Arts Festival is known for 3 days of desert heat, trendy tunes, and breathtaking art installations,...

How To Guides and Tutorials Internet Security Privacy & Identity Protection

Is Your Password a Priority? Top Takeaways From Our World Password Survey

Whether you’re signing up for a new video-streaming service, logging back into your email, or checking your online banking, passwords...

McAfee Labs

Analysis of Chrysaor Keylogging Mechanism Shows Power of Simple Malicious Code

Many attacks on mobile devices use social engineering to initially infect a victim’s system. They download malware and elevate privileges...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top