Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security How To Guides and Tutorials Family Safety

Ghouls of the Internet: Protecting Your Family from Scareware and Ransomware

It’s the middle of a workday. While researching a project, a random ad pops up on your computer screen alerting...

Internet Security

Ghosts of Botnets Past, Present, and Future

‘Twas the morning of October 21st, and all through the house many IoT devices were stirring, including a connected mouse....

Internet Security How To Guides and Tutorials

Ghosts May Not Be Real but Trolls Are – Look Out for Social Media Trolls

The Cambridge Dictionary describes a troll as “an imaginary, either very large or very small creature in traditional Scandinavian stories,...

Family Safety

Getting Your Kids Ready for School—And Their Smartphones Too

If you’re the parent of a tween or teen, chances are they’re not the only ones going back to school....

Family Safety

Getting Down With The Kids – Internet Slang for Dummies!

Whenever my boys come home with a new buzz word or saying, I instantly feel like a dinosaur. Whether it...

McAfee News

Get Yourself AI-powered Scam Text Protection That Spots and Block Scams in Real Time

The tables have turned. Now you can use AI to spot and block scam texts before they do you harm. ...

Privacy & Identity Protection

Get Your Online Privacy Under Control

Online privacy: too often managing this aspect of our digital lives gets shuffled to the bottom of our ‘to-do’ lists....

How To Guides and Tutorials Family Safety

Get Schooled on Security

It’s hard to imagine what college would have been like if I had today’s technology in my arsenal. With spell...

McAfee Labs

Generative AI: Cross the Stream Where it is Shallowest

The explosive growth of Generative AI has sparked many questions and considerations not just within tech circles, but in mainstream...

McAfee Labs

GandCrab Ransomware Puts the Pinch on Victims

Update: On August 9 we added our analysis of Versions 4.2.1 and 4.3.  The GandCrab ransomware first appeared in January...

McAfee Labs

GameOver Zeus/Cryptolocker: Am I Still Infected?

It has been two weeks since the announcement by multiple global law enforcement agencies regarding the takedown of the communications...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

Game Over! Malicious Minecraft Character Skins Infect Over 50,000 Accounts

Video games allow users to become a whole new persona, to experience imaginary worlds, and live out scenarios that are...

Internet Security Mobile Security Privacy & Identity Protection

Game Golf Exposure Leaves Users in a Sand Trap of Data Concerns

Apps not only provide users with a form of entertainment, but they also help us become more efficient or learn...

McAfee Labs

Fuzzing ImageMagick and Digging Deeper into CVE-2020-27829

Introduction: ImageMagick is a hugely popular open source software that is used in lot of systems around the world. It...

McAfee Labs

Further Analysis of WannaCry Ransomware

McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its...

Life at McAfee

From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee

From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee March is Women’s History Month and International...

Internet Security Privacy & Identity Protection

From the Ground Up: How the Cars of the Future Will Be Secured

Autonomous systems are doing wonders for us, whether it be in factory manufacturing or recommending where you go to get...

Internet Security McAfee News Security News

From the Cloud to Drones: Threat Predictions for 2017

2016 has been quite the year. From widespread IoT attacks, to ransomware campaigns that extract millions of dollars, cyberthreats have...

McAfee Labs

From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats

Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as “Asynchronous Remote Access Trojan,” represents a highly sophisticated malware...

Internet Security McAfee News

From Smart Shoes to Safe Routers: Innovation Shines Bright at CES 2017

CES 2017 (the Consumer Electronics Show) has come and gone once again, bringing with it the newest wearables, state-of-the-art tech...

Life at McAfee

From Military Kid to Product Marketing: My McAfee Journey

Employee Spotlight: Meet Jovohn! From military beginnings to mobile security champion, meet Jovohn, our passionate Product Marketer and MAHC President....

Mobile Security

From Internet to Internet of Things

Thirty years ago, Tim Berners-Lee set out to accomplish an ambitious idea – the World Wide Web. While most of...

McAfee Labs

From Email to RAT: Deciphering a VB Script-Driven Campaign

Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized by obfuscated Visual...

Internet Security

From Election Day to Inauguration: How Cybersecurity Safeguards Democracy

Inauguration Day has come and gone, and the peaceful transfer of power couldn’t have happened without the intricate systems that...

McAfee Labs

From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta

Management. Control. It seems that you can’t stick five people in a room together without one of them trying to...

Privacy & Identity Protection

Frequently Asked Questions About Identity Theft

The more you know about identity theft, the better prepared you will be to prevent it from happening to you. Here are some commonly asked questions about identity theft.

Internet Security How To Guides and Tutorials

Frequent Fortnite Player? 4 Tips to Combat the New Attack on User Accounts

Epic Games’ Fortnite has risen in popularity rapidly since its debut, and cybercriminals have leveraged that popularity to enact a handful...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top