Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee Labs

McAfee Labs Report Reveals Latest COVID-19 Threats and Malware Surges

The McAfee Advanced Threat Research team today published the McAfee Labs Threats Report: April 2021. In this edition, we present...

Internet Security How To Guides and Tutorials

Why Coin Miners Go Bad & How to Protect Your Tech When They Do

Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and Monero to cash in on the recent gold rush. Bitcoin’s meteoric rise in value is...

Internet Security McAfee News

McAfee Awarded “Cybersecurity Excellence Awards”

In a year where people relied on their digital lives more than ever before and a dramatic uptick in attacks quickly followed, McAfee’s protection stood strong.  We’re proud to...

McAfee News Life at McAfee

McAfee VP Shares His Four Pledges for a Healthier Lifestyle

After experiencing a health scare that changed his life, VP of Technology Services, Paul, vowed to make incremental changes by...

McAfee Labs

Clever Billing Fraud Applications on Google Play: Etinu

Authored by: Sang Ryol Ryu and Chanung Pak A new wave of fraudulent apps has made its way to the...

Internet Security Privacy & Identity Protection

Digital Divorce: Who Gets the Airline Miles and Music Files?

Something you’ll want to know about all those movies, mp3s, eBooks, air miles, and hotel points you’ve accrued over the years: they’re digital assets that can factor...

McAfee Labs

Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation

Executive Summary Many malware attacks designed to inflict damage on a network are armed with lateral movement capabilities. Post initial...

How To Guides and Tutorials Mobile Security

Beware of BRATA: How to Avoid Android Malware Attack

Cybercriminals go to great lengths to hack personal devices to gather sensitive information about online users. To be more effective, they make significant investments in their technology. Also, cybercriminals are...

How To Guides and Tutorials

What Is Adware? A Definitive Guide

We live in a digital world and a lot of our daily activities are online, including banking, grocery shopping, and...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top