Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee Labs

InstallCube: How Russian Programmers Turn Adware Into Cash

We often observe applications bundled with ad-displaying programs to generate revenue for those products. These are not necessarily unethical, but...

McAfee Labs

McAfee Adds Flash Exploit Detection to NSP 8.2

Adobe Flash vulnerabilities and exploits have worried users and security professionals for many years. The situation today remains serious. A...

Internet Security Mobile Security

What is Ransomware?

Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly...

McAfee Labs

Slow File Infector Spies on Victims

Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents,...

Family Safety

5 Priceless Gifts You Already Give Your Kids Every Day

  If you are like me, the holidays usher in an assortment of feelings—some warm and fuzzy and some not...

Internet Security McAfee News Security News

2014: Security Year in Review

From the Heartbleed bug to large-scale (and highly publicized) data breaches, Shellshock to mobile threats—2014 did not leave us wanting...

How To Guides and Tutorials Family Safety

7 Tips to Boost Your Family Goal Setting for 2015

To catch a vision for your family in the year ahead first requires a brief look back. What worked in...

Internet Security McAfee News

Introducing the McAfee Partner Program

What better way to kickoff the start of 2015 than with our new McAfee Partner Program. This new program was...

Internet Security Privacy & Identity Protection

To Preserve Bandwidth, Gogo Inflight Executes a Man-in-the-Middle Attack

Early last week, Gogo Inflight, a provider of in-flight Internet access for airlines, caught a lot of headlines for a...

Mobile Security

Every Step You Take, Every Call You Make: Is Your Phone Watching You?

Imagine a world where every mobile move you make – each text message and phone call – is broadcast to...

Mobile Security

Don’t Believe These 6 Mobile Security Myths

Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits...

Internet Security Privacy & Identity Protection

Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own

Director Michael Mann’s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity...

Internet Security Privacy & Identity Protection

Windows 10 Makes a Strong Move Towards a Security Conscious Future

The past week has been an exciting one for cyber security announcements. On Tuesday, President Obama gave his State of...

Internet Security Privacy & Identity Protection

What is a Rootkit?

A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit...

Family Safety Privacy & Identity Protection

How Password Managers are Saving the Day

As I get older, I am convinced that my memory is fading.  Whether it’s names, places or even passwords, my...

Internet Security

Safer Internet Day – What Are You Doing To Stay Safe Online?

If there was ever a reminder to make sure we are playing it safe online then it’s Safer Internet Day....

Family Safety

Love, Trust and Text Messages in the Digital Age

Roses are red, violets are blue, but does your security matter to your loved one too? Okay, so maybe my...

McAfee Labs

Steamstealer Attacks Victims via Chat

During the last few months, McAfee Labs has seen an increase in Steamstealer samples. The following chart shows the recent...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top