Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Mobile Security Privacy & Identity Protection

Should you pull your smart plug?

While some may think, “why would I need my toaster to connect to the internet,” smart home devices continue to...

Mobile Security Privacy & Identity Protection

Should you pull your smart plug?

While some may think, “why would I need my toaster to connect to the internet,” smart home devices continue to...

How To Guides and Tutorials Privacy & Identity Protection

Should You Use Near-Field Communications?

Have you ever wondered what kind of superpower you’d have? I’ve always wanted to send messages and ideas with my...

Internet Security How To Guides and Tutorials

Six Easy Steps to Help Keep Hackers at Bay

Cybercriminals are adopting complex and powerful techniques to “hack,” or take control of online accounts belonging to other people or...

McAfee Labs

Six Hundred Million Reasons to Celebrate: No More Ransom Turns FOUR!!

Happy Birthday! Today we mark the fourth anniversary of the NoMoreRansom initiative with over 4.2 million visitors, from 188 countries,...

McAfee Labs

Slow File Infector Spies on Victims

Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents,...

McAfee News Security News

Small Businesses Save Up to 60% in McAfee and Visa Partnership

Small business owners are getting a special deal on their online protection through a partnership between McAfee and Visa. With new ways of working creating online opportunities and risks for...

Mobile Security

Smart Home Goes Scandi As IKEA Rolls Out a Smart Home Lineup

Ah, IKEA. The furniture store probably best known for simple furnishings with not-so-simple assembly instructions (and simply delicious Swedish meatballs)...

How To Guides and Tutorials

Smart home safety tips

Do you live in a “smart” home? If you look around and see interactive speakers, IP cameras, and other internet-connected...

Mobile Security Privacy & Identity Protection

Smart Home, or Dumb Home/Smart Cloud?

At the end of my street, tucked between some bushes and a tree in someone else’s garden, is a weathered...

Family Safety

Smart Parents Dig Deeper Than Clickbait

This blog was written by Jocelyn Brewer. We’ve all seen it – that family at the café, heads down, scrolling...

Internet Security Mobile Security

Smart Perimeter – A Security Fence For Your Digital Devices

Everyone has experienced that gut-wrenching feeling when you look around and realize that one of your prized possessions is missing. ...

Internet Security

Smart Tips for Staying Safer Online

The recent WannaCry ransomware attack that infected more than 250,000 computers worldwide was a good reminder to everyone about staying...

Internet Security Mobile Security

Smart TVs and Refrigerators Used in Internet-of-Things Cyberattack

In this article, we’ll explore what happened when hundreds of thousands of these devices were roped into an extensive Internet-of-Things (IoT) cyber attack, how it happened, and how you can protect your smart devices to stay safe.

How To Guides and Tutorials Family Safety

Smarter Clicks: 5 Tips to Help Your Family Avoid Risky Cyber Search Traps

Searching the internet has become as much a part of daily life as pouring that first cup of coffee each...

Mobile Security Family Safety

Smartphone Alternatives for Free-Ranging Kids

Smartphone Alternatives for Free-Ranging Kids A popular topic in our blogs is “when to buy a child a smartphone,” and...

Mobile Security Family Safety

Smartphone Alternatives: Ease Your Way into Your Child’s First Phone

“But everyone else has one.”  Those are familiar words to a parent, especially if you’re having the first smartphone conversation...

Mobile Security Security News

Smartphone Kill Switch Could Become Federal Law

There is no doubt that mobile devices are an integral part of our daily lives, making their potential loss all...

Mobile Security

Smartphone Security: Five Steps Beating and Blocking Robocalls

Some scams can make a telltale sound—rinnng, rinnng! Yup, the dreaded robocall. Not only are they annoying, but they can also hit you in the pocketbook.   In the U.S., unwanted calls...

Family Safety

Smartphones in Classrooms: is it Time for a Rethink?

In 2017, you’d be hard pressed to find many teens heading off to school WITHOUT a smartphone in their pockets....

McAfee Labs

SMBGhost – Analysis of CVE-2020-0796

The Vulnerability The latest vulnerability in SMBv3 is a “wormable” vulnerability given its potential ability to replicate or spread over...

McAfee Labs

Smishing Campaign Steals Banking Credentials in U.S.

The McAfee Mobile Research team recently found an active smishing campaign, using SMS messages, that targets online banking users in...

McAfee Labs

SMS Phishing Campaign Spreads in China

Phishing messages and fake websites for stealing users’ credentials are a common occurrence. Recently, however, mobile banking users in China...

Family Safety

Snap Map: What Parents Need To Know Now

Just when we were finally getting our heads around Snapchat, now the world’s most popular photo messaging app has added...

Mobile Security Privacy & Identity Protection Security News

Snapchat Hacked: 4.6M Phone Numbers Leaked

Snapchat is, undeniably, one of the great tech success stories of 2013. The photo sharing app, known for it’s deletion...

Family Safety

SnapChat-Like Apps Hide Content on Twitter, Facebook

Just when parents figured out SnapChat, an app that makes photo texts disappear, two new apps hit the social scene that...

Internet Security Mobile Security

SnapHack: Hacking for the Greater Good?

Most hacks and attacks introduced on this blog are blatantly malicious, looking to nab your valuable information. However, this may...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top