Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security McAfee News

McAfee Receives the 2019 Security Excellence Award From IoT Evolution

If you’re like most users, you’ve probably adopted several smart devices into your home over the last few years. Whether...

McAfee Labs

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us

Episode 1: What the Code Tells Us McAfee’s Advanced Threat Research team (ATR) observed a new ransomware family in the...

McAfee Labs

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – The All-Stars

Episode 2: The All-Stars Analyzing Affiliate Structures in Ransomware-as-a-Service Campaigns This is the second installment of the McAfee Advanced Threat...

Internet Security Family Safety Privacy & Identity Protection

Chapter Preview: Birth to Age 2 – First Footprints

When your baby is on the way, their privacy and digital security is probably the last thing you have on...

Internet Security

Is Your Browser Haunted With Ghostcat Malware?

October is finally among us, and things are spookier than usual. One ghost causing some hocus pocus across the World...

How To Guides and Tutorials Mobile Security Family Safety

Device & App Safety Guide for Families

While we talk about online safety each week on this blog, October is National Cybersecurity Awareness Month (NCSAM), a time...

Internet Security Privacy & Identity Protection

Stay Smart Online Week 2019

Let’s Reverse the Threat of Identity Theft!! Our online identities are critical. In fact, you could argue that they are...

Privacy & Identity Protection

Hackable?” Tests Whether Car Key Fobs Are Secure

Smart key fobs make it easy to open your car, pop the trunk, and start driving without fumbling around for...

Internet Security Privacy & Identity Protection

Watch Your Step: Insights on the TOMS Shoes Mailing Hack

You’re familiar with the cybercriminals that go after users’ credit card information and look to spread malicious links, but recently,...

Privacy & Identity Protection

15 Easy, Effective Ways to Start Winning Back Your Online Privacy

Someone recently asked me what I wanted for Christmas this year, and I had to think about it for a...

McAfee Labs

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Follow The Money

Episode 3: Follow the Money This is the third installment of the McAfee Advanced Threat Research (ATR) analysis of Sodinokibi...

Internet Security

Chapter Preview: Ages 2 to 10 – The Formative Years

As our children venture into toddlerhood, they start to test us a bit. They tug at the tethers we create...

Internet Security Privacy & Identity Protection Security News

Hack-ception: Benign Hacker Rescues 26M Stolen Credit Card Records

There’s something ironic about cybercriminals getting “hacked back.” BriansClub, one of the largest underground stores for buying stolen credit card...

How To Guides and Tutorials Family Safety

Want Your Kids to Care More About Online Safety? Try These 7 Tips

The topics parents need to discuss with kids today can be tough compared to even a few years ago. The...

McAfee Labs

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Crescendo

Episode 4: Crescendo This is the final installment of the McAfee Advanced Threat Research (ATR) analysis of Sodinokibi and its...

Internet Security McAfee News

“Gilmore Girls” Actress Alexis Bledel Is McAfee’s Most Dangerous Celebrity

You probably know Alexis Bledel from her role as the innocent book worm Rory Gilmore in network television’s “Gilmore Girls”...

Internet Security

How Googling Our Favourite Celebrities Is A Risky Business

Did you know that searching for your favourite celebrities online may very well increase your chance of running into trouble?...

Internet Security Privacy & Identity Protection

Could a Streaming Device Help Hackers Hijack Your TV?

Streaming devices make dumb TVs smart and smart TVs, well, smarter. But as loyal “Hackable?” listeners know, the smarter something...

McAfee Labs

Using Expert Rules in ENS to Prevent Malicious Exploits

Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention. Learn more about which threats they can help block.

Internet Security McAfee News

McAfee Reveals the Most Dangerous Celebrities Across the Globe

Earlier this week, we revealed McAfee’s Most Dangerous Celebrity of 2019 in the U.S., Alexis Bledel. Growing from a young...

How To Guides and Tutorials Family Safety

How to Remove Viruses from Your Android Phone

One of my favorite binges of late is the Netflix series Halt and Catch Fire. It’s a story about the personal...

McAfee Labs

Did You Check Your Quarantine?!

A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

A Cybersecurity Horror Story: Stay Secure From October’s Creepiest Threats

Halloween time is among us and ghosts and goblins aren’t the only things lurking in the shadows. This past month...

McAfee Labs

Office 365 Users Targeted by Voicemail Scam Pages

McAfee Labs has been observing a new phishing campaign using a fake voicemail message to lure victims into entering their Office 365 email credentials.

How To Guides and Tutorials Privacy & Identity Protection

3 Tips to Protect Yourself From the Office 365 Phishing Scams

Cybercriminals seem to get more and more sophisticated with their attacks, and phishing scams are no different. The McAfee Labs...

Family Safety

Chapter Preview: Ages 11 to 17 – From Tweens to Teens

For anyone who asks what happens during the tween through teen years, the best answer is probably, “What doesn’t happen?!”...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

What You Need to Know About the Google Chrome Vulnerabilities

While you might have been preoccupied with ghosts and goblins on Halloween night, a different kind of spook began haunting...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top