Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Privacy & Identity Protection

The Wearable Future Is Hackable. Here’s What You Need To Know

Quick mental math challenge: How many Apple Watches can you buy with $118 billion dollars? If you guessed around 296...

How To Guides and Tutorials Internet Security Family Safety

The Week That Was In Internet History

From the wheel to the internet, we have come a long way in terms of technological progress. While the invention...

Internet Security Privacy & Identity Protection

The What, Why, and How of AI and Threat Detection

There are more online users now than ever before, thanks to the availability of network-capable devices and online services. The internet...

Internet Security

The Wild West of AI: Do Any AI Laws Exist?

Are we in the Wild West? Scrolling through your social media feed and breaking news sites, all the mentions of...

Internet Security Security News McAfee News

The Year That Was – Cybersecurity Takeaways From 2018

So, what was 2018 like for you? Just another year, a whirlwind of happiness and heartbreaks, or a momentous one...

Mobile Security Privacy & Identity Protection

The ‘Beginners Guide To IoT’

This blog post was written by Nick Viney. You’ve probably heard the term ‘smart’ being placed in front of everyday...

Mobile Security

The “Nasty List” Phishing Scam Is out to Steal Your Instagram Login

How often do you check your social media accounts? According to a recent study, internet users spend an average of...

Mobile Security

Thelma – The Real-Life Voice Scam That Made It into the Movies

This has to be a first. Something from our blogs got made into a movie. We’re talking about voice scams,...

Mobile Security Family Safety

These Cute Teddy Bears Have Been Recording Your Kids

When we think of cyberhacks, we often think of criminals trying to break into a network of important information protected...

Mobile Security Privacy & Identity Protection

Think Twice Before Trusting These 14 Android Apps with Your Login Information

In life, there are a handful of people that each of us truly trust – and can confide in fully....

Privacy & Identity Protection

This Data Privacy Day Own Your Privacy, Even On Social Sites

One of the positive trends that we’ve seen in recent years is governments and users pressuring companies to simplify their...

Internet Security

This Election Season, Be on the Lookout for AI-generated Fake News

It’s that time of year again: election season! You already know what to expect when you flip on the TV....

How To Guides and Tutorials Internet Security Privacy & Identity Protection

This Holiday Season, Watch Out for These Cyber-Grinch Tricks Used to Scam Holiday Shoppers

McAfee threat researchers have identified several consumer brands and product categories most frequently used by cybercriminals to trick consumers into...

Internet Security

This Valentine’s Day Let Your Digital Life Take a Backseat

A couple of decades ago, Valentine’s Day was all about red roses, exchanging cards, dinner dates, hand-holding and whispering sweet...

Family Safety

This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too

This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too Love is in the...

Family Safety Privacy & Identity Protection

This Valentine’s Day, Share Your Love, Not Your Personal Data

This blog post was written by Bruce Snell. Valentine’s Day is just around the corner, are you ready?  Have you...

Security News

This Week in Scams: $16.6 Billion Lost, Deepfakes Rise, and Google Email Scams Emerge

Welcome to the first edition of This Week in Scams, a new weekly series from McAfee breaking down the latest...

Internet Security

This World Password Day, Here’s How a Password Manager Can Simplify Your Life

Passwords: we entrust our most important data to these strings of letters, numbers, and special characters. So, we should make...

Internet Security Privacy & Identity Protection

This Year at Black Hat: Danger Drones and Thermostat Ransomware

This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it...

Mobile Security Internet Security Privacy & Identity Protection

Thoughts from the conference floor: securing the connected home

This blog post was written by Nick Viney. In my line of work, you read and hear a lot about...

McAfee Labs

Threat Actors Employ COM Technology in Shellcode to Evade Detection

COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...

McAfee Labs

Threat Actors Taking Advantage of FTX Bankruptcy 

Authored by Oliver Devane  It hasn’t taken malicious actors long to take advantage of the recent bankruptcy filing of FTX,...

McAfee Labs

Threat Actors Use Encrypted Office Binary Format to Evade Detection

This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...

McAfee Labs

Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack

This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...

McAfee Labs

Threat Report: Don’t Join Blockchain Revolution Without Ensuring Security

On May 19 researchers discovered a series of vulnerabilities in the blockchain-based EOS platform that can lead to remote control...

Life at McAfee

Three Lessons I’ve Learned Battling Cancer and Cybercriminals

By Celeste, Senior Principal Engineer With our people at the heart, we are McAfee As Chief Data Scientist, Senior Principal...

Privacy & Identity Protection

Three Reasons You Need a VPN

You know what a VPN is, but the question remains—why do you need a VPN?  There’s one good reason. Your...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top