Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security How To Guides and Tutorials Mobile Security

3 Things You Need to Know About Summer Cybersecurity

The summer season is quickly approaching. Users will take to the skies, roads, and oceans to travel throughout the world...

Internet Security Privacy & Identity Protection

Don’t Let Airbnb Scams Stop Your Summer Travel Plans

With summertime just around the corner, many people are planning vacations to enjoy some much-needed R&R or quality time with...

McAfee Labs

Cryptocurrency Laundering Service, BestMixer.io, Taken Down by Law Enforcement

A much overlooked but essential part in financially motivated (cyber)crime is making sure that the origins of criminal funds are...

McAfee Labs

RDP Stands for “Really DO Patch!” – Understanding the Wormable RDP Vulnerability

During Microsoft’s May Patch Tuesday cycle, a security advisory was released for a vulnerability in the Remote Desktop Protocol (RDP)....

Mobile Security

“Hackable?” Puts Smartphones to the Test

Is the Personal Data on Your Smartphone Vulnerable? Listen to Find Out: Used for everything from banking and taking pictures,...

Mobile Security Family Safety

Breaches and Bugs: How Secure are Your Family’s Favorite Apps?

Is your family feeling more vulnerable online lately? If so, you aren’t alone. The recent WhatsApp bug and social media...

Internet Security How To Guides and Tutorials Mobile Security

3 Tips for Protecting Against the New WhatsApp Bug

Messaging apps are a common form of digital communication these days, with Facebook’s WhatsApp being one of the most popular...

Mobile Security Privacy & Identity Protection

The iOS Twitter Bug: 3 Tips to Protect Your Location Data

Many of us use social media to keep our family and friends up-to-date on our everyday lives. We don’t typically...

Privacy & Identity Protection

Privacy Awareness Week 2019 – Protect Your Online Privacy

If you haven’t given your online privacy much attention lately then things need to change. In our era of weekly...

Mobile Security Family Safety

On Mother’s Day, Show Your Love for Your Mom by Introducing Her to Helpful Apps

A mobile chat with my mother usually goes off like this: “Hello! Can you hear me! I am very busy...

How To Guides and Tutorials Family Safety

Saving Summer: 5 Strategies to Help Reign In Family Screen Time Over Break

It’s the most wonderful time of the year — for teachers and lifeguards. For everyone else (parents) we have a...

Internet Security

Avoid a Security Endgame: Learn About the Latest “Avengers” Scam

Marvel Studio’s $2.2 billion box-office hit “Avengers: Endgame” has quickly risen to the second-highest grossing film of all time in...

Internet Security Mobile Security

#Verified — Worth the Risk?

In the social media world, a little blue checkmark next to a username is a sought-after status symbol. Celebrities, global...

How To Guides and Tutorials Family Safety

What Would Yoda Do? 5 Tips to Raising a Mindful Digital Jedi

A Jedi, from the epic Star Wars films, is a warrior who fights for the greater good. Jedi are set...

Internet Security Privacy & Identity Protection

What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation

Gary Davis is now a regular contributor on the Tech Nation podcast!  In this episode, Gary Davis educates that phishing...

Internet Security Privacy & Identity Protection

Protect Your Digital Life: Why Strong Passwords Matter

Over the years, our lives have become more and more digital. Think about it: 20 years ago, no one was...

McAfee News Privacy & Identity Protection Security News

It’s World Password Day – Give your Passwords an Overhaul!

How much of your personal data is stored online? Well, if you are anything like the ‘average Jo’ – the...

Mobile Security Security News

Wi-Fi Woes: Android Hotspot App Leaves 2 Million Passwords Exposed

Logging onto a free Wi-Fi network can be tempting, especially when you’re out running errands or waiting to catch a...

McAfee Labs

LockerGoga Ransomware Family Used in Targeted Attacks

Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga,...

Family Safety

Digital Parenting: ‘Eat Your Veggies, Brush Your Teeth, Strengthen Your Passwords’

As adults, we know the importance of strong passwords, and we’ve likely preached the message to our kids. But let’s...

Internet Security Mobile Security Privacy & Identity Protection

Something’s Phishy With the Instagram “HotList”

Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages...

Internet Security

Here’s a Codicil to Add to Your Will – Disposal of Your Digital Assets

Codicil to Add to your Will – Disposal of Your Digital Assets We were still in shock over the sudden...

Internet Security Privacy & Identity Protection

McAfee ATR Team Discovers New IoT Vulnerability in Wemo Insight Smart Plugs

*This blog is originally from August 2018 and was updated April 2019* From connected baby monitors to smart speakers —...

Mobile Security

The “Nasty List” Phishing Scam Is out to Steal Your Instagram Login

How often do you check your social media accounts? According to a recent study, internet users spend an average of...

Mobile Security

From Internet to Internet of Things

Thirty years ago, Tim Berners-Lee set out to accomplish an ambitious idea – the World Wide Web. While most of...

Family Safety

The Mute Button: How to Use Your Most Underrated Social Superpower

For a Monday, the school day was turning out to be surprisingly awesome. Mackenzie sat with friends at lunch, chatted with...

McAfee Labs

IoT Zero-Days – Is Belkin WeMo Smart Plug the Next Malware Target?

Effective malware is typically developed with intention, targeting specific victims using either known or unknown vulnerabilities to achieve its primary...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top