Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security Privacy & Identity Protection

Do I Need to Hide My IP Address?

New threats to our online privacy emerge every day, from relatively benign tracking of our activities for marketing purposes, to more invasive measures that can put our security at risk. This has led some people to wonder whether they should take steps to hide their IP address. In truth, it ...

Family Safety

Is the TikTok App Safe for Kids?

Everyone’s talking about the TikTok app. In addition to talking, tweens and teens are swiping, laughing, and sharing TikTok videos....

Internet Security How To Guides and Tutorials

Burning Man Is Coming: How to Watch out for Ticket Scammers

As the winter months fade and spring begins to creep up, many millennials and Gen Zers set their sights on...

Mobile Security Family Safety

How vulnerability disclosure keeps you and your family safe

Surrounded by smart home devices as well as apps which integrate with other services, we are entering an age of...

Privacy & Identity Protection

Frequently Asked Questions About Identity Theft

The more you know about identity theft, the better prepared you will be to prevent it from happening to you. Here are some commonly asked questions about identity theft.

Mobile Security Family Safety

TikTok Challenge, Hoop App, and Other Headlines You May Have Missed

Digital news that affects families seems to be dominating the headlines these days. To keep parents in the know, here...

McAfee Labs

CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II

In our first article we discussed the growing pattern of targeted ransomware attacks where the first infection stage is often...

McAfee Labs

Model Hacking ADAS to Pave Safer Roads for Autonomous Vehicles

The last several years have been fascinating for those of us who have been eagerly observing the steady move towards...

McAfee Labs

Introduction and Application of Model Hacking

Catherine Huang, Ph.D., and Shivangee Trivedi contributed to this blog. The term “Adversarial Machine Learning” (AML) is a mouthful!  The...

Internet Security

Consumers want a fully connected life – but at what cost?

Convenience has always, and will always be king. That’s why it’s no surprise that the average person is collecting connected...

Family Safety

Timeless Principles to Help Your Child Develop Social Superpowers

“You can make more friends in two months by becoming interested in other people than you can in two years...

How To Guides and Tutorials Family Safety

How You (and Your Teen) Can Stay Safe While Looking for Love Online

Valentine’s Day is such a double-edged sword. If you’re feeling the love and just can’t get enough of your sweetheart...

McAfee Labs

CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I

For many years now I have been working and teaching in the field of digital forensics, malware analysis and threat...

McAfee Labs

Knock, Knock – Who’s There?

A Windows Linux Subsystem Interop Analysis Following our research from Evil Twins and Windows Linux Subsystem, interoperability between different WSL...

McAfee Labs

How Chinese Cybercriminals Use Business Playbook to Revamp Underground

Preface Because of its longevity and technical sophistication, the Russian cybercriminal underground has long been the benchmark for threat researchers...

McAfee Labs

Intelligence in the Enterprise

Intelligence became an integral military discipline centuries ago. More recently, this practice evolved into what is called Intelligence Preparation of the Battlefield,...

Internet Security McAfee News

Safer Internet Day 2020

What Can You Do To Make The Internet a Better Place In 2020, you’d be hard-pressed to find an Aussie...

Internet Security How To Guides and Tutorials

WhatsApp Users: Secure Your Desktop With These Tips

With over 500 million daily active users, WhatsApp is one of the world’s most popular messaging platforms. In an effort...

Family Safety

7 Conversations to Help Build Up Your Family’s Digital Literacy Skills

With the surge of misleading content online, helping your child learn to become an independent thinker is no small task....

Life at McAfee

McAfee’s Women in Security Offer New Grads Career Insights

Launching your career is an exciting milestone, one that can also be nerve-wracking though. Chances are questions like What should...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How To Protect Your Vote During Election

The 2020 U.S. presidential primaries are right around the corner. As people gear up to cast their ballots for party...

McAfee Labs

U.S. Battleground County Website Security Survey

Today McAfee released the results of a survey of county websites and county election administration websites in the 13 states...

Family Safety

Spotting Fake News: Teaching Kids to be Responsible Online Publishers

Editor’s note: This is part II in a series on Fake News. Read part I, here. Kids today are not...

McAfee News Privacy & Identity Protection Security News

Security Lessons From 2019’s Biggest Data Breaches

2019 already feels like it’s worlds away, but the data breaches many consumers faced last year are likely to have...

Internet Security Mobile Security

What You Need to Know About the FedEx SMiShing Scam

You receive a text message saying that you have a package out for delivery. While you might feel exhilarated at...

Privacy & Identity Protection

Take Action This Data Privacy Day

We all know that data breaches have been on the rise, and hackers are finding clever, new ways to access...

Family Safety

Where’s the Truth Online? How to Build Your Family’s Digital Discernment

Note: This is Part I of a series on equipping your family fight back against fake news online.  Fake news...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top