Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security McAfee News

Introducing the McAfee Partner Program

What better way to kickoff the start of 2015 than with our new McAfee Partner Program. This new program was...

Internet Security Privacy & Identity Protection

Introducing the ‘Most Hackable’ Gifts of the Holiday Season

It’s that time of year again: the time for a gauntlet of ads, shopping trips, and crowds as we begin...

Internet Security

Introducing World’s First Automatic and AI-powered Deepfake Detector

In today’s digital age, the line between reality and digital fabrication is increasingly blurred, thanks to the rise of deepfake...

McAfee Labs

Introduction and Application of Model Hacking

Catherine Huang, Ph.D., and Shivangee Trivedi contributed to this blog. The term “Adversarial Machine Learning” (AML) is a mouthful!  The...

Internet Security Privacy & Identity Protection

Introduction to “Is Your Digital Front Door Unlocked?” a book by Gary Davis

“Is Your Digital Front Door Unlocked?” explores the modern implications of our human nature: our inherent inclination to share our...

McAfee Labs

Invisible Adware: Unveiling Ad Fraud Targeting Android Users

Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and it’s no surprise...

Mobile Security

iOS Users Aren’t So Immune to Threats After All

  10 years ago, Fergie and Gwen Stefani were at the top of the charts, and Juno had just been...

Internet Security Mobile Security Privacy & Identity Protection

iOS Users: Update Your Software to Avoid Security Vulnerabilities

On Monday, Apple made some bold announcements at their keynote event, including new subscription offerings for news, television, video games,...

Privacy & Identity Protection

IoT and Privacy: Keeping Secrets from your Webcam

This blog post was written by Bruce Snell. Have you ever put your kids to bed only to have them...

McAfee Labs

IoT Devices: The Gift that Keeps on Giving… to Hackers

McAfee Advanced Threat Research on Most Hackable Gifts You’ve probably noticed the recent increase in Internet connected drones, digital assistants,...

Mobile Security Family Safety

IoT Lockdown: Ways to Secure Your Family’s Digital Home and Lifestyle

If you took an inventory of your digital possessions chances are, most of your life — everything from phones to...

McAfee Labs

IoT Zero-Days – Is Belkin WeMo Smart Plug the Next Malware Target?

Effective malware is typically developed with intention, targeting specific victims using either known or unknown vulnerabilities to achieve its primary...

Mobile Security

iPhone Update — Apply It Now If You Haven’t Already

Apple recently issued an urgent iPhone update, iOS version 16.5.1. If you haven’t updated yet, you should.  Owners of iPads...

Mobile Security

iPhone Users: Here’s What You Need to Know About the Latest iOS Hacks

iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently...

Mobile Security

iPhone Users: This Mobile Malware Could Allow Cybercriminals to Track Your Location

The iPhone and many of the apps designed to live on the device have the ability to track our location....

McAfee Labs

IPS Countermeasures Fight Obfuscation, Evasion

Before the advent of intrusion detection systems (IDS) and intrusion prevention systems (IPS), firewalls served as the primary technology to...

McAfee Labs

Iran Cyber Threat Update

Recent political tensions in the Middle East region have led to significant speculation of increased cyber-related activities. McAfee is on...

McAfee Labs

Iranian Keylogger Marmoolak Enters via Backdoor

Targeted attacks have several stages, sometimes called the APT kill chain. At McAfee Labs we prefer the model described by...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top