Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog
Family Safety

Getting Down With The Kids – Internet Slang for Dummies!

Whenever my boys come home with a new buzz word or saying, I instantly feel like a dinosaur. Whether it is ‘noob’ or ‘epic fail’ (all said with a huge dose of attitude!) the linguistic chasm between us just seems to get wider. But when it comes to kids’ online ...

Executive Perspectives

The 3 R’s: Riches, Ruins & Regulations

We previously wrote about what it means to be a security-obligated executive – how to identify threat warning signs and prep against cyber-attacks. Historically either the C-suite and the security teams haven’t spoken at all, or security teams haven’t spoken to execs in a simple enough language to be understood. ...

Family Safety

Internet Safety Resolutions for 2013

My daughter loves forming New Year resolutions! Every January 01, she diligently pens down her resolutions (always interesting ones!) on a pretty piece of paper, decorates it beautifully and then tacks it over her study with coloured tapes.  It helps her to keep things in perspective for the year, she ...

Family Safety

Is Your SNS Addiction Getting Out of Hand? – All Names Aren’t Cool

The news that went viral on social networking sites last week made me smile and shake my head and say, “Oh dear, oh dear”, in a real Miss Marple fashion. The Internet community was agog with the news of a newborn being named Hashtag! Nothing extraordinary perhaps, given the penchant ...

McAfee Labs

Red Kit an Emerging Exploit Pack

Exploit kits are toolkits that are used to build malware components such as binaries and scripts. They automate the exploitation of client-side vulnerabilities, targeting browsers and programs. These exploit kits provide an effective way for cybercriminals to distribute malware without the users consent. Among these kits, the Blackhole exploit kit ...

Enterprise

Intelligent DLP with End-user Classification

One of the biggest challenges for Data Protection solution is identifying sensitive data.  Today, organizations generate various types of sensitive data, ranging from regulated data such as PCI to unstructured data such as product designs.  Not all sensitive data can be identified and protected via regular expressions and keywords. By ...

McAfee Labs

If You Deploy Only Antivirus, It Will Cost You More and Make You Less Secure

Everyone’s looking to shave their IT budgets, manage fewer vendors and streamline. The plethora of low cost and sometimes free AV products is an enticing option to lower the cost to secure any business. Some free antivirus programs do an acceptable job of detecting, blocking and removing certain kinds of ...

McAfee Labs

YouTube Video Scam Targets Facebook Users

Be advised cybercriminals are at it again, leveraging the popularity of Facebook and YouTube to scam consumers.We have seen several scams in the past spreading through Facebook promising of some leaked video of celebrities, or free Facebook T-shirts etc. The malware authors are making money by pay-per-click with these techniques. ...

Consumer Threat Reports

A Look Back: Top 5 Security Trends of 2012

As we look back on 2012, it’s impossible not to recall the many high-profile breaches and cybersecurity incidents that took place this year. 2012 has certainly been a rocky one for online safety and consumer security as a whole, with numerous high-traffic websites breached and more malware and mobile threats ...

Consumer Threat Reports

W32/Autorun Worm: A Nasty Bug for Your Computer

What do you think of when you hear the word “malware”? Most people think of the general term “virus”–something that a hacker puts on your computer that disrupts activity or steals information. In reality, malware (malicious software) can encompass a variety of different hacker tools, and true viruses are just ...

Subscribe to McAfee Securing Tomorrow Blogs