Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee News

New Year, New Partner Learning Center

This blog post was written by Allison Clarke. Thinking Big In 2015 we are “Thinking Big” and nothing demonstrates this...

Internet Security Privacy & Identity Protection

Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own

Director Michael Mann’s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity...

McAfee Labs

The Rise of Backdoor-FCKQ (CTB-Locker)

By Raj Samani (@Raj_Samani) and Christiaan Beek (@ChristiaanBeek) In the McAfee Labs Threats Report published in November 2014, Senior Vice...

Internet Security Privacy & Identity Protection

Windows 10 Makes a Strong Move Towards a Security Conscious Future

The past week has been an exciting one for cyber security announcements. On Tuesday, President Obama gave his State of...

Internet Security Privacy & Identity Protection

What is a Rootkit?

A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit...

Family Safety Privacy & Identity Protection

How Password Managers are Saving the Day

As I get older, I am convinced that my memory is fading.  Whether it’s names, places or even passwords, my...

Internet Security

Safer Internet Day – What Are You Doing To Stay Safe Online?

If there was ever a reminder to make sure we are playing it safe online then it’s Safer Internet Day....

Family Safety

Love, Trust and Text Messages in the Digital Age

Roses are red, violets are blue, but does your security matter to your loved one too? Okay, so maybe my...

McAfee Labs

Steamstealer Attacks Victims via Chat

During the last few months, McAfee Labs has seen an increase in Steamstealer samples. The following chart shows the recent...

Internet Security Privacy & Identity Protection

What is a Remote Administration Tool (RAT)?

Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I...

How To Guides and Tutorials Family Safety

How to Remove Unwanted Photos of Your Child Online

There’s a chance you may skip this blog post thinking to yourself: This will never happen to my child. I have a...

Internet Security Privacy & Identity Protection

Hacking the Human OS: A Report on Social Engineering

Why are data breaches so commonplace?  Whether the attacks are against the energy sector as reported July 2014[i] with over...

Internet Security Mobile Security

Hacking Humans: How Cybercriminals Trick Their Victims

McAfee has compiled a list of the top ways cybercriminals play with the minds of their targeted victims. And the...

Internet Security McAfee News

Ransomware, PUPs, Vulnerabilities: a Look at What’s Putting You at Risk

Every quarter McAfee  releases a report on the cybersecurity issues confronting consumers, business partners, and the public. Produced by McAfee...

How To Guides and Tutorials Family Safety

7 Tips to Help Your Teen Avoid Conflict in Group Texts

If you’ve ever had a conversation over email or text take a sudden nosedive due to miscommunication, then buckle up—you...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

Five Ways the Internet of Things Can Put Your Security at Risk

Sometimes a new technology comes along that’s so promising, so revolutionary, that, over time, future citizens consider the innovation to...

Family Safety

Why Snapchat is Here to Stay and Why Parents Should Care

Remember this time last year when Snapchat was this vague, phantom-like disappearing photo app? Well, in just a year’s time,...

McAfee Labs

Amazon Gift Card Malware Spreading via SMS

McAfee Labs recently published its Hacking the Human OS report, which details a number of ways in which cybercriminals rely...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top