Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

How To Guides and Tutorials Mobile Security Family Safety

Device & App Safety Guide for Families

While we talk about online safety each week on this blog, October is National Cybersecurity Awareness Month (NCSAM), a time...

Internet Security

Is Your Browser Haunted With Ghostcat Malware?

October is finally among us, and things are spookier than usual. One ghost causing some hocus pocus across the World...

Internet Security Privacy & Identity Protection Family Safety

Chapter Preview: Birth to Age 2 – First Footprints

When your baby is on the way, their privacy and digital security is probably the last thing you have on...

McAfee Labs

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – The All-Stars

Episode 2: The All-Stars Analyzing Affiliate Structures in Ransomware-as-a-Service Campaigns This is the second installment of the McAfee Advanced Threat...

McAfee Labs

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us

Episode 1: What the Code Tells Us McAfee’s Advanced Threat Research team (ATR) observed a new ransomware family in the...

Internet Security McAfee News

McAfee Receives the 2019 Security Excellence Award From IoT Evolution

If you’re like most users, you’ve probably adopted several smart devices into your home over the last few years. Whether...

Family Safety

5 Digitally-Rich Terms to Define, Discuss with Your Kids

Over the years, I’ve been the star of a number of sub-stellar parenting moments. More than once, I found myself...

Internet Security

Attention YouTubers: Protect Your Account From Being Hacked

Did you know that YouTube has 23 million content creators worldwide? Well, it turns out that many of these video...

Privacy & Identity Protection

“Hackable?” Puts Wireless Mice to the Test

Wireless mice have become the preferred peripheral to scroll and click, and for most users, all they are really worried...

Family Safety

5 Hidden Hashtag Risks Every Parent Needs Know

Adding hashtags to a social post has become second nature. In fact, it’s so common, few of us stop to...

Internet Security Privacy & Identity Protection

Is Your Medical Data Safe? 16 Million Medical Scans Left Out in the Open

Have you ever needed to get an X-ray or an MRI for an injury? It turns out that these images, as...

Internet Security Privacy & Identity Protection

Chapter Preview: It All Starts with Your Personal Data Lake

Once, not long ago, data was nestled in paper files or stored on isolated computer networks, housed in glassed-off, air-conditioned...

Internet Security Privacy & Identity Protection

Solving the Gamer’s Dilemma: Security vs. Performance

As of last year, 2.2 billion1 people consider themselves gamers across the globe. Of that 2.2 billion, over 50% – 1.22...

Family Safety

Are Cash Transfer Apps Safe to Use? Here’s What Your Family Needs to Know

I can’t recall the last time I gave my teenage daughter cash for anything. If she needs money for gas,...

How To Guides and Tutorials Privacy & Identity Protection

Millions of Car Buyer Records Exposed: How to Bring This Breach to a Halt

Buying a car can be quite a process and requires a lot of time, energy, and research. What most potential...

How To Guides and Tutorials Internet Security

How To Practise Good Social Media Hygiene

Fact – your social media posts may affect your career, or worse case, your identity! New research from the world’s...

How To Guides and Tutorials Internet Security

Iron Man’s Instagram Hacked: Snap Away Cybercriminals With These Social Media Tips

Celebrities: they’re just like us! Well, at least in the sense that they still face common cyberthreats. This week, “Avengers:...

McAfee Labs

How Visiting a Trusted Site Could Infect Your Employees

The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top