Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee Labs

Improve Protection Against Cyberattacks Through Shared Threat Intelligence

This blog post was written by Rick Simon. At the RSA Conference 2016 in San Francisco, Chris Young, GM and...

McAfee Labs

Imposter Netflix Chrome Extension Dupes 100k Users

Authored by Oliver Devane, Vallabh Chole, and Aayush Tyagi  McAfee has recently observed several malicious Chrome Extensions which, once installed,...

Internet Security Privacy & Identity Protection

Importance of Renewing Your Security Software on a Regular Basis – Part II

Let’s start by refreshing all that we discovered in my previous blog, where I was telling Reena about harmful malware...

Internet Security Family Safety

Importance of Cybersecurity Lessons in Schools

Are you aware that there are more than 460 million internet users in India, and this is expected to grow...

Internet Security McAfee News

Ileana D’Cruz Tops ‘McAfee Most Sensational Celebrity’ List for 2018

We Indians love our movies and actors and voraciously consume all Page 3 gossip tidbits on them. Our love affair...

Family Safety

If You Give A Hacker Your Email Address…

Your email address, innocuous as it may seem, is often one of the gateways into your digital persona. This article aims to shed light on the potential dangers and impacts of giving away your email address to the wrong people.

McAfee Labs

If You Deploy Only Antivirus, It Will Cost You More and Make You Less Secure

Everyone’s looking to shave their IT budgets, manage fewer vendors and streamline. The plethora of low cost and sometimes free...

McAfee Labs

IE Scripting Flaw Still a Threat to Unpatched Systems: Analyzing CVE-2018-8653

Microsoft recently patched a critical flaw in Internet Explorer’s scripting engine that could lead to remote code execution. The vulnerability...

Mobile Security McAfee Labs

iDroid Bot for Sale Taps Into Mobile Wallets

During recent weeks we’ve seen a new botnet kit advertised in several Russian forums. The iDroidbot costs US$1,500 and targets...

How To Guides and Tutorials Family Safety

Identity Theft 101: Five Smart Tech Tips for College-Bound Kids

Starting college marks the first of many adulting firsts — first dorm room, first roommate, first no-curfew-on-a-school-night — indeed, there...

Privacy & Identity Protection

Identity Protection Service: The Best Solution to a Growing Problem

I’m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history...

McAfee Labs

iBanking Mobile Trojan Poses as Facebook Token Generator

Mobile banking Trojans have usually pretended to be security applications (for example, Zitmo) or legitimate banking apps (FakeToken or FkSite a.k.a....

McAfee Labs

I Smell a RAT: Java Botnet Found in the Wild

Most of today’s malware works on Windows and its apps, because it can affect a lot of people around the...

McAfee Labs

HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit

McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the Angler...

Internet Security How To Guides and Tutorials Security News

Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety

Over the past year and a half, workers everywhere have gotten used to working from home. They have adopted an...

McAfee Labs

HVACking: Understanding the Delta Between Security and Reality

The McAfee Labs Advanced Threat Research team is committed to uncovering security issues in both software and hardware to help...

McAfee Labs

Hunting for Blues – the WSL Plan 9 Protocol BSOD

Windows Subsystem for Linux Plan 9 Protocol Research Overview This is the final blog in the McAfee research series trilogy...

Mobile Security

How ‘Switcher’ Malware Moves an Attack from Your Phone to Your Router

Why attack one device when you can get inside an entire network and manipulate every device connected to it? That’s...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top