Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee Labs

InstallCube: How Russian Programmers Turn Adware Into Cash

We often observe applications bundled with ad-displaying programs to generate revenue for those products. These are not necessarily unethical, but...

McAfee Labs

McAfee Adds Flash Exploit Detection to NSP 8.2

Adobe Flash vulnerabilities and exploits have worried users and security professionals for many years. The situation today remains serious. A...

Internet Security Mobile Security

What is Ransomware?

Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly...

McAfee Labs

Slow File Infector Spies on Victims

Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents,...

Family Safety

5 Priceless Gifts You Already Give Your Kids Every Day

  If you are like me, the holidays usher in an assortment of feelings—some warm and fuzzy and some not...

Internet Security McAfee News Security News

2014: Security Year in Review

From the Heartbleed bug to large-scale (and highly publicized) data breaches, Shellshock to mobile threats—2014 did not leave us wanting...

How To Guides and Tutorials Family Safety

7 Tips to Boost Your Family Goal Setting for 2015

To catch a vision for your family in the year ahead first requires a brief look back. What worked in...

Internet Security McAfee News

Introducing the McAfee Partner Program

What better way to kickoff the start of 2015 than with our new McAfee Partner Program. This new program was...

Internet Security Privacy & Identity Protection

To Preserve Bandwidth, Gogo Inflight Executes a Man-in-the-Middle Attack

Early last week, Gogo Inflight, a provider of in-flight Internet access for airlines, caught a lot of headlines for a...

Mobile Security

Every Step You Take, Every Call You Make: Is Your Phone Watching You?

Imagine a world where every mobile move you make – each text message and phone call – is broadcast to...

Mobile Security

Don’t Believe These 6 Mobile Security Myths

Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits...

Internet Security Privacy & Identity Protection

Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own

Director Michael Mann’s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity...

Internet Security Privacy & Identity Protection

Windows 10 Makes a Strong Move Towards a Security Conscious Future

The past week has been an exciting one for cyber security announcements. On Tuesday, President Obama gave his State of...

Internet Security Privacy & Identity Protection

What is a Rootkit?

A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit...

Family Safety Privacy & Identity Protection

How Password Managers are Saving the Day

As I get older, I am convinced that my memory is fading.  Whether it’s names, places or even passwords, my...

Internet Security

Safer Internet Day – What Are You Doing To Stay Safe Online?

If there was ever a reminder to make sure we are playing it safe online then it’s Safer Internet Day....

Family Safety

Love, Trust and Text Messages in the Digital Age

Roses are red, violets are blue, but does your security matter to your loved one too? Okay, so maybe my...

McAfee Labs

Steamstealer Attacks Victims via Chat

During the last few months, McAfee Labs has seen an increase in Steamstealer samples. The following chart shows the recent...

Internet Security Privacy & Identity Protection

Hacking the Human OS: A Report on Social Engineering

Why are data breaches so commonplace?  Whether the attacks are against the energy sector as reported July 2014[i] with over...

Internet Security Mobile Security

Hacking Humans: How Cybercriminals Trick Their Victims

McAfee has compiled a list of the top ways cybercriminals play with the minds of their targeted victims. And the...

Internet Security McAfee News

Ransomware, PUPs, Vulnerabilities: a Look at What’s Putting You at Risk

Every quarter McAfee  releases a report on the cybersecurity issues confronting consumers, business partners, and the public. Produced by McAfee...

How To Guides and Tutorials Family Safety

7 Tips to Help Your Teen Avoid Conflict in Group Texts

If you’ve ever had a conversation over email or text take a sudden nosedive due to miscommunication, then buckle up—you...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

Five Ways the Internet of Things Can Put Your Security at Risk

Sometimes a new technology comes along that’s so promising, so revolutionary, that, over time, future citizens consider the innovation to...

Family Safety

Why Snapchat is Here to Stay and Why Parents Should Care

Remember this time last year when Snapchat was this vague, phantom-like disappearing photo app? Well, in just a year’s time,...

McAfee Labs

Amazon Gift Card Malware Spreading via SMS

McAfee Labs recently published its Hacking the Human OS report, which details a number of ways in which cybercriminals rely...

Internet Security Privacy & Identity Protection

What is a Potentially Unwanted Program (PUP)?

Whether you’re an animal person or not, you have to admit that puppies are pretty darn cute. So cute that...

Internet Security McAfee News Security News

Office 365 Ascent Is Security Opportunity

Microsoft is on a roll with its cloud strategy. In the past two quarters, the software giant has posted triple-digit...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top