Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee Labs

Experts Discuss the 2016 Verizon DBIR: June #SecChat

Cybersecurity in 2016 has been full of sensational headlines. Ransomware has shut down multiple hospitals, millions of credentials have been...

McAfee Labs

Examining Your Very Own Sefnit Trojan

Most malware is created for economic purposes. To name just a few of our reports and blogs on this topic,...

McAfee Labs

Examining the Link Between TLD Prices and Abuse

This blog was written by Charlie Feng. Briefing Over the years, McAfee researchers have observed that certain new top-level Domains...

McAfee Labs

Examining Code Reuse Reveals Undiscovered Links Among North Korea’s Malware Families

Attacks from the online groups Lazarus, Silent Chollima, Group 123, Hidden Cobra, DarkSeoul, Blockbuster, Operation Troy, and 10 Days of Rain are believed to have come from North Korea. But how can we know with certainty?

Internet Security Privacy & Identity Protection

Evolving Security Products for the new Realities of Living Life From Home

Announcing McAfee’s Enhanced Consumer Security for New Consumer Realities With millions of people continuing to work and study remotely, scammers have...

Security News Internet Security McAfee News

Evolving Marketing Innovation – Our Strategy in the Security Technology Industry

Every year we recognize partners for achieving excellence in a variety of categories. Last month at our Americas Partner Summit,...

Mobile Security

Evolved IoT Linux Worm Targets Users’ Devices

Since the early ‘90s, Linux has been a cornerstone of computer operating systems. Today, Linux is everywhere — from smartphones...

McAfee Labs

Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study

Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the...

McAfee Labs

Evolution of Android Malware: IRCBot Joins the Party

We all know how fast the smart phone market is growing. Along with it, the complexity and the numbers of...

Privacy & Identity Protection Family Safety

Everything You Need to Know to Keep Your Passwords Secure

How do you manage all those user names and passwords without having a cheat sheet in a file on your computer or stuck on post-it notes next to your computer? Neither option provides the security you should reserve for passwords.

Mobile Security

Everything You Need to Know to Avoid a Man-in-the-Middle Mobile Attack

Monkey in the middle, the beloved playground staple, extends beyond schoolyards into corporate networks, home desktops, and personal mobile devices...

Privacy & Identity Protection

Everything You Need to Know About Identity Remediation

There are no ifs, ands, or buts about it: A stolen identity creates a mess. Once they have a few...

Internet Security Privacy & Identity Protection

Everyone Loves Selfies, Including Malware!

This blog was written by Bruce Snell. I was talking with some of my coworkers the other day about why...

Life at McAfee

Everyday Hero: 5 Questions with McAfee Labs’ Paula Greve

iWith cybersecurity experts taking center stage this week at the Black Hat conference in Las Vegas, the world is watching...

Mobile Security

Every Step You Take, Every Call You Make: Is Your Phone Watching You?

Imagine a world where every mobile move you make – each text message and phone call – is broadcast to...

Mobile Security

Every Step You Take, Every Call You Make: Is Your Phone Tracking You?

So, what does your phone know about you? Taken all together it knows plenty — sometimes in ways that feel...

McAfee Labs

Evasion Techniques: Encoded JavaScript Attacks PDF Files

Last week I kicked off a series of blogs with a discussion of how an effective IPS solution can fight...

Internet Security Privacy & Identity Protection

Essential Tips to Avoid ATM Skimming

In this guide, we will delve into some of the security threats around ATMs, with a focus on skimming, and share tips on protecting your data and money in your bank account.

How To Guides and Tutorials Internet Security

Entertainment #FromHome: What to do When You’re Bored at Home

 Entertainment #FromHome: What to do when you’re bored at home   If your queue of movies and shows are looking...

How To Guides and Tutorials

Entertainment #FromHome: How to start your own podcast

How to start your own podcast Start your own podcast? Why not? Instead of streaming someone else’s show, maybe it’s...

How To Guides and Tutorials Internet Security

Entertainment #FromHome: Photo Backups, Digital Picture Frames, and More!

Entertainment From Home: Back up your photos, create digital picture frames, and more! One thing many of us have is...

McAfee Labs

ENS 10.7 Rolls Back the Curtain on Ransomware

Ransomware protection and incident response is a constant battle for IT, security engineers and analysts under normal circumstances, but with...

Privacy & Identity Protection Family Safety

End the Hate: 10 Ways to Stand Up and Help Stomp Out Bullying

Bullying can cause immense physical and emotional pain, leading to decreased self-esteem, increased anxiety, and even suicide in extreme cases. Given its severe potential consequences, it’s critical for every one of us to take steps to end the hate.

Internet Security

Encrypted Messaging Service Hack Exposes Phone Numbers

Many people opt for encrypted messaging services because they like the additional layers of privacy they offer. They allow users...

Life at McAfee

Employees Share Stories Working in Award–Winning Cork Office

“The culture at McAfee is easy going, fun, dynamic and everyone is friendly.”—Deirdre, Project Manager The McAfee office in Cork...

McAfee Labs

Emotet’s Uncommon Approach of Masking IP Addresses

Authored By: Kiran Raj In a recent campaign of Emotet, McAfee Researchers observed a change in techniques. The Emotet maldoc...

McAfee Labs

Emotet Trojan Acts as Loader, Spreads Automatically

Since the middle of July, McAfee has observed new updates of the Emotet, a Trojan that was first discovered in...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top