Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Mobile Security

The Top 5 Scariest Mobile Threats

Scary movies are great. Scary mobile threats, not so much.  Ghosts, killer clowns, and the creatures can stir up all...

Family Safety

The Top 5 Ways To Protect Your Family From Scams

Scams are big business for cybercriminals. In 2023, Aussies lost a whopping $2.7 billion in scams. Barely a week goes...

Internet Security

The Top Tax Scams of 2024

While last-minute tax filers stare down the clock, scammers look for easy pickings. Tax scams are in full swing as...

Internet Security McAfee News

The Top Technology Takeaways From CES 2020

Another Consumer Electronics Show (CES) has come and gone. Every year, this trade show joins practically everyone in the consumer...

McAfee Labs

The Tradeoff Between Convenience and Security – A Balance for Consumers & Manufacturers

This week McAfee Advanced Threat Research (ATR) published new findings, uncovering security flaws in two popular IoT devices: a connected...

Internet Security

The Trends & Challenges Facing The Internet Of Things

This blog post was written by Nick Viney. The Internet of Things, or IoT, is now commonplace in society today....

McAfee Labs

The Twin Journey, Part 1

Summary and Introduction: The recent changes in Windows 10, aiming to add case sensitivity (CS) at directory level, have prompted...

McAfee Labs

The Twin Journey, Part 2: Evil Twins in a Case In-sensitive Land

In the first of this 3-part blog series, we covered the implications of promoting files to “Evil Twins” where they...

McAfee Labs

The Twin Journey, Part 3: I’m Not a Twin, Can’t You See my Whitespace at the End?

In this series of 3 blogs (you can find part 1 here, and part 2 here), so far we have...

Privacy & Identity Protection Security News

The Uber Data Breach: What Consumers Need to Know

Ride-sharing apps are one of the most successful innovations of the modern digital age. Practically everyone who has a smart...

Family Safety

The Ultimate CyberParenting Hack – Managing Your Family’s Cybersafety with your Wi-Fi

Managing your family’s cybersafety can often feel overwhelming. But one thing I have learnt in my 22 years of parenting...

Internet Security How To Guides and Tutorials Security News

The Ultimate Guide to Safe Sharing Online

We live in a world that thrives on digital connectivity. According to We Are Social, Canadians are now spending half a day more...

Internet Security

The Ultimate Holiday Shopping Guide

The holidays are almost here! That means it’s time to start making your list and checking it twice. To help prepare you for...

Mobile Security Privacy & Identity Protection Security News

The VORACLE OpenVPN Attack: What You Need to Know

Many of us know that using a VPN (Virtual Private Network) adds an extra layer of security to our Wi-Fi...

Privacy & Identity Protection

The Wearable Future Is Hackable. Here’s What You Need To Know

Quick mental math challenge: How many Apple Watches can you buy with $118 billion dollars? If you guessed around 296...

Internet Security How To Guides and Tutorials Family Safety

The Week That Was In Internet History

From the wheel to the internet, we have come a long way in terms of technological progress. While the invention...

Internet Security Privacy & Identity Protection

The What, Why, and How of AI and Threat Detection

There are more online users now than ever before, thanks to the availability of network-capable devices and online services. The internet...

Internet Security

The Wild West of AI: Do Any AI Laws Exist?

Are we in the Wild West? Scrolling through your social media feed and breaking news sites, all the mentions of...

Internet Security McAfee News Security News

The Year That Was – Cybersecurity Takeaways From 2018

So, what was 2018 like for you? Just another year, a whirlwind of happiness and heartbreaks, or a momentous one...

Mobile Security Privacy & Identity Protection

The ‘Beginners Guide To IoT’

This blog post was written by Nick Viney. You’ve probably heard the term ‘smart’ being placed in front of everyday...

Mobile Security

The “Nasty List” Phishing Scam Is out to Steal Your Instagram Login

How often do you check your social media accounts? According to a recent study, internet users spend an average of...

Mobile Security

Thelma – The Real-Life Voice Scam That Made It into the Movies

This has to be a first. Something from our blogs got made into a movie. We’re talking about voice scams,...

Mobile Security Family Safety

These Cute Teddy Bears Have Been Recording Your Kids

When we think of cyberhacks, we often think of criminals trying to break into a network of important information protected...

Mobile Security Privacy & Identity Protection

Think Twice Before Trusting These 14 Android Apps with Your Login Information

In life, there are a handful of people that each of us truly trust – and can confide in fully....

Privacy & Identity Protection

This Data Privacy Day Own Your Privacy, Even On Social Sites

One of the positive trends that we’ve seen in recent years is governments and users pressuring companies to simplify their...

Internet Security

This Election Season, Be on the Lookout for AI-generated Fake News

It’s that time of year again: election season! You already know what to expect when you flip on the TV....

Internet Security How To Guides and Tutorials Privacy & Identity Protection

This Holiday Season, Watch Out for These Cyber-Grinch Tricks Used to Scam Holiday Shoppers

McAfee threat researchers have identified several consumer brands and product categories most frequently used by cybercriminals to trick consumers into...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top