Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security

Protect What Matters on Data Privacy Day

Imagine a “Privacy Facts” label on the apps, devices, and websites you use. Like a digital version of the “Nutrition...

Family Safety

Protect the Whole Family with McAfee+ Ultimate Family Plan

Dozens of content creators center their channels on highlighting the differences between today’s most prominent generations: the Silent Generation, baby...

Family Safety

Protect that Rep! Tips to Help Your High Schooler Shine Online

Do you remember being a teenager and your mom threatening to surgically remove the telephone receiver from your face because you’d...

Internet Security

Pros and Cons of AI in Daily Life

Artificial intelligence: It’s society’s newest darling and newest villain. AI is the newest best friend to creatives, time-strapped people, and...

Mobile Security Privacy & Identity Protection Security News

Proliferation of Mobile Devices: The Impact on Consumer Security

As the use of mobile devices continues to skyrocket worldwide, a new danger is silently emerging against consumers. This article delves into the deep end of how the proliferation of mobile devices is impacting consumer security

McAfee Labs

Product Coverage and Mitigation for CVE-2014-1776 (Microsoft Internet Explorer)

On April 26, Microsoft released Security Advisory 2963983 for Microsoft Internet Explorer. In-the-wild exploitation of this vulnerability has been observed...

McAfee Labs

Product Coverage and Mitigation for CVE-2014-1761 (Microsoft Word)

On March 24, Microsoft released Security Advisory 2953095 for Microsoft Word. In-the-wild exploitation of this vulnerability has been observed across...

Internet Security Privacy & Identity Protection

Process Reimaging: A Cybercrook’s New Disguise for Malware

As of early 2019, Windows 10 is running on more than 700 million devices, including PCs, tablets, phones, and even...

Privacy & Identity Protection

Privacy, Identity, and Device Protection: Why You Need to Invest in All Three

Protecting your devices with antivirus is a great start, yet it’s only one part of staying safer online. With the...

Internet Security

Privacy in Practice: Securing Your Data in 2023 and Beyond

Every year we can count on new technology to make our lives easier. Right? As beneficial and convenient as tech...

Privacy & Identity Protection

Privacy in Practice: Securing Your Data in 2021 and Beyond

Technological advancements continually emerge that make our lives easier. Right? As beneficial and convenient as emerging tech is, it can...

Privacy & Identity Protection

Privacy Awareness Week-Are We Responsible for Our Data Breach?

“The best match for me,” announced my daughter one Sunday morning sometime back, “is a Scorpio.” “Oh really? And this...

Privacy & Identity Protection

Privacy Awareness Week 2019 – Protect Your Online Privacy

If you haven’t given your online privacy much attention lately then things need to change. In our era of weekly...

Family Safety

Privacy Awareness Week 2017: It’s Time To Talk More To Your Kids

Attention, parents with kids between 8 and 17! Here’s a statistic that is probably going to make you squirm –...

Internet Security Family Safety

Prioritizing Security in a Remote Learning Environment 

Prioritizing Security in a Remote Learning Environment  Learning environments are not what they used to be, and as educational institutions...

McAfee News

Price Book Changes for 2014

Our Price Books have been complicated and difficult to use. So as part of our continuing effort to be easier...

Internet Security Privacy & Identity Protection

Preventing WebCobra Malware From Slithering Onto Your System

Cryptocurrency mining is the way transactions are verified and added to the public ledger, a database of all the transactions...

Internet Security Mobile Security

Pre-Installed Malware on Android Devices Expose Flaws in Supply Chain

Pencils come with erasers, books come with pages, and taxes (most of the time) come with returns. People like it...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top