Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

How To Guides and Tutorials

Election 2020: Make Sure Your Voice is Heard with These Tips

Election 2020: Make Sure Your Voice is Heard with These Tips & Best Practices Last year, India exercised one of...

Mobile Security

Electronics in Flight: How Harmful are Mobile Devices to Your Aircraft?

We all know the drill: before takeoff and landing the flight attendants do a final safety inspection, walking up and...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

Elevate Your Financial Security: How to Safely Bank Online

Today’s technology allows you to complete various tasks at the touch of a button wherever you go. As a result, you place trust in online services that make...

Internet Security How To Guides and Tutorials Mobile Security

Ellen DeGeneres Instagram Hack: What You Can Do to Protect Your Account

Today was not an easy morning for Ellen DeGeneres. She woke to find that her Instagram account was briefly hacked...

Internet Security

Email Hackers, Go Home! New Security Updates Come to Gmail

Email has been an integral part of our culture for more than two decades now. It seems like just yesterday...

Life at McAfee

Embrace change! Chris’s McAfee Journey

In this career-journey series, Internal Audit Manager Chris shares his recent journey joining the McAfee finance team and why he...

Internet Security McAfee News

EMEA Channel Partner Summit: The highlights

This blog was written by David Small. As we look ahead to our annual FOCUS Security conference, a three day...

McAfee Labs

Emerging ‘Stack Pivoting’ Exploits Bypass Common Security

[This blog was primarily written by Xiaoning Li of McAfee Labs, with assistance from Peter Szor of McAfee Labs.] In...

Internet Security McAfee News

Emilia Clarke Is the Most Dangerous Game of Thrones® Celebrity

The net is dark and full of terrors, especially for fans of HBO’s popular show Game of Thrones®. As followers...

Internet Security Mobile Security

Emma Watson Video Scam: Hackers Use Celeb’s Popularity to Unleash Viruses

Following the announcement of the 2014 Most Dangerous Celebrities™ earlier this month, our senses have been heightened to scams on...

McAfee Labs

Emotet Downloader Trojan Returns in Force

During the past couple of days, we have seen an increase in activity from Emotet. This Trojan downloader spreads by...

McAfee Labs

Emotet Trojan Acts as Loader, Spreads Automatically

Since the middle of July, McAfee has observed new updates of the Emotet, a Trojan that was first discovered in...

McAfee Labs

Emotet’s Uncommon Approach of Masking IP Addresses

Authored By: Kiran Raj In a recent campaign of Emotet, McAfee Researchers observed a change in techniques. The Emotet maldoc...

Life at McAfee

Employees Share Stories Working in Award–Winning Cork Office

“The culture at McAfee is easy going, fun, dynamic and everyone is friendly.”—Deirdre, Project Manager The McAfee office in Cork...

Internet Security

Encrypted Messaging Service Hack Exposes Phone Numbers

Many people opt for encrypted messaging services because they like the additional layers of privacy they offer. They allow users...

Family Safety Privacy & Identity Protection

End the Hate: 10 Ways to Stand Up and Help Stomp Out Bullying

Bullying can cause immense physical and emotional pain, leading to decreased self-esteem, increased anxiety, and even suicide in extreme cases. Given its severe potential consequences, it’s critical for every one of us to take steps to end the hate.

McAfee Labs

ENS 10.7 Rolls Back the Curtain on Ransomware

Ransomware protection and incident response is a constant battle for IT, security engineers and analysts under normal circumstances, but with...

Internet Security How To Guides and Tutorials

Entertainment #FromHome: Photo Backups, Digital Picture Frames, and More!

Entertainment From Home: Back up your photos, create digital picture frames, and more! One thing many of us have is...

How To Guides and Tutorials

Entertainment #FromHome: How to start your own podcast

How to start your own podcast Start your own podcast? Why not? Instead of streaming someone else’s show, maybe it’s...

Internet Security How To Guides and Tutorials

Entertainment #FromHome: What to do When You’re Bored at Home

 Entertainment #FromHome: What to do when you’re bored at home   If your queue of movies and shows are looking...

McAfee Labs

Evasion Techniques: Encoded JavaScript Attacks PDF Files

Last week I kicked off a series of blogs with a discussion of how an effective IPS solution can fight...

Mobile Security

Every Step You Take, Every Call You Make: Is Your Phone Tracking You?

So, what does your phone know about you? Taken all together it knows plenty — sometimes in ways that feel...

Mobile Security

Every Step You Take, Every Call You Make: Is Your Phone Watching You?

Imagine a world where every mobile move you make – each text message and phone call – is broadcast to...

Life at McAfee

Everyday Hero: 5 Questions with McAfee Labs’ Paula Greve

iWith cybersecurity experts taking center stage this week at the Black Hat conference in Las Vegas, the world is watching...

Internet Security Privacy & Identity Protection

Everyone Loves Selfies, Including Malware!

This blog was written by Bruce Snell. I was talking with some of my coworkers the other day about why...

Privacy & Identity Protection

Everything You Need to Know About Identity Remediation

There are no ifs, ands, or buts about it: A stolen identity creates a mess. Once they have a few...

Mobile Security

Everything You Need to Know to Avoid a Man-in-the-Middle Mobile Attack

Monkey in the middle, the beloved playground staple, extends beyond schoolyards into corporate networks, home desktops, and personal mobile devices...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top