Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Family Safety

8 Ways to Secure Your Family’s Online Holiday Shopping

It’s officially the most wonderful time of the year — no doubt about it. But each year, as our reliance...

Privacy & Identity Protection

Is a Laptop’s Password Enough to Keep it Secure?

It could happen to any of us. One minute your laptop is sitting on a coffeehouse table or going through...

Family Safety

Has Your Phone Become Your Third Child? Ways to Get Screen Time Anxiety Under Control

You aren’t going to like this post. However, you will, hopefully, find yourself nodding and perhaps, even making some changes...

Internet Security Privacy & Identity Protection

What Your Password Says About You

At the end of last year, a survey revealed that the most popular password was still “123456,” followed by “password.” These...

Internet Security

Don’t Get PWNed by Fake Gaming Currency Sites

If you’re a gamer, you know how important virtual currency is. It allows you to purchase new costumes and weapons...

Internet Security McAfee News

2018 Americas Partner Summit

The Americas Partner Summit 2018 was held on Tuesday, October 16 at MPOWER Cybersecurity Summit. It was a day filled...

Family Safety

Holiday Stress Can Make You More Careless Online

Holiday stress. Every year, come November, my resting heart rate starts to rise: the festive season is approaching. Not only...

Internet Security Privacy & Identity Protection

Preventing WebCobra Malware From Slithering Onto Your System

Cryptocurrency mining is the way transactions are verified and added to the public ledger, a database of all the transactions...

Internet Security Privacy & Identity Protection

Why Traditional Database Security Doesn’t Protect Data

If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers...

Family Safety

Be the Child On Children’s Day – Build Better Bonds With Your Kids

November 14th is a day children in India keenly look forward to. Schools and neighbourhoods gear up to make the...

How To Guides and Tutorials Mobile Security

Shop till You’re Hacked? 3 Tips to Stay Secure this Holiday Season

With just days until Black Friday, the unofficial kick off to the holiday shopping season is quickly approaching. In anticipation...

McAfee Labs

WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency

McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies.

Family Safety

What Parents Need to Know About Live-Stream Gaming Sites Like Twitch

Clash of Clans, Runescape, Fortnite, League of Legends, Battlefield V, and Dota 2. While these titles may not mean much...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

“League of Legends” YouTube Cheat Links: Nothing to “LOL” About

If you’re an avid gamer, you’ve probably come across a game that just seems impossible to complete. That’s because, thanks...

McAfee Labs

Triton Malware Spearheads Latest Attacks on Industrial Systems

Malware that attacks industrial control systems (ICS), such as the Stuxnet campaign in 2010, is a serious threat. This class of cyber sabotage can spy on, disrupt, or destroy systems that manage large-scale industrial processes. An essential danger in this threat is that it moves from mere digital damage to ...

Family Safety

At What Age Should Kids Join Social Media?

Last week, I waved goodbye to my eldest son as he moved halfway across the world to study for a...

Life at McAfee

McAfee Explorers: From Student to Teacher

Ahmad, Software Architect Hailing from a small town in India, school for me was largely a means to an end....

Internet Security Privacy & Identity Protection

A New Security Age Needs a New Approach to Security

Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption,...

Life at McAfee

How I Thrive in Technology at McAfee

By: Hannah, Software Quality Assurance Engineer I joined the McAfee Quality Assurance team at the Brighton office earlier this year....

Internet Security How To Guides and Tutorials

Connected or Compromised? How to Stay Secure While Using Push Notifications

You’re probably familiar with push notifications – messages sent by app publishers that pop up on your desktop or mobile...

Privacy & Identity Protection

Hackable? Is Putting Virtual Reality to the Test

From gaming to helping people conquer their fear of spiders and getting quarterbacks ready for Sunday, virtual reality is a...

Internet Security Mobile Security

Beware: Zombie IoT Botnets

The ghosts and ghouls of October have come and gone, but the dangers lurking behind virtual walls have hardly disappeared....

Internet Security Privacy & Identity Protection

Light a Lamp This Diwali To Dispel the Darkness of Digital Literacy

One of my favourite Indian festivals is Diwali and I have a sneaky feeling I may have mentioned this a...

Mobile Security Family Safety

IoT Lockdown: Ways to Secure Your Family’s Digital Home and Lifestyle

If you took an inventory of your digital possessions chances are, most of your life — everything from phones to...

Internet Security How To Guides and Tutorials

How to Protect Yourself from Tech Support Imposters

Many of us rely on our technology throughout our everyday lives. So, when something goes wrong, we look to tech...

Internet Security How To Guides and Tutorials

Kraken Ransomware Emerges from the Depths: How to Tame the Beast

Look out, someone has released the Kraken — or at least a ransomware strain named after it. Kraken Cryptor ransomware...

McAfee Labs

Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims

Alexandr Solad and Daniel Hatheway of Recorded Future are coauthors of this post. Read Recorded Future’s version of this analysis. ...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top