Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security Family Safety

What is Typosquatting?

Typosquatting, also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright)...

Family Safety

Does Kik Messenger Pose a Danger to Your Kids?

With more than 50 million users, and reportedly growing by 20,000 everyday, Kik has become one of the most popular...

Internet Security

Internet Browser Cookies: Not What Grandma Used To Make

Imagine you’re surfing the web in search of a new pair of shoes on Zappos.com. You browse the website, look...

Mobile Security

What Master Key? – Android Signature Bypass Vulnerability

Recently, a vulnerability in Android package signature verification was announced by Jeff Forristal, CTO of Bluebox Security. Jeff plans on...

McAfee Labs

New Zero-Day Attack Copies Earlier Flash Exploitation

Late on July 10, Microsoft released a blog post disclosing that they were aware of a zero-day attack in the...

Mobile Security McAfee Labs

Adult Voice-Service Apps on Google Play Japan Charge Users Without Notice

McAfee has reported on increasing fraudulent Android applications on Google Play in Japan this year, including one-click fraud applications and...

How To Guides and Tutorials Internet Security Privacy & Identity Protection

Before You Share, Ask Yourself “Is This TMI?”

Social networks and new online services make it easy to share the details of our lives, perhaps too easily. With...

Family Safety

Helping Kids Understand Their ‘Digital Footprint’

It’s easy to talk in general about an important topic and apply a catchy phrase to it without our kids...

McAfee Labs

Malware Manipulates Procedure Prologue and Epilogue to Evade Security

Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers,...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top