Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee Labs

Bing.VC Hijacks Browsers Using Legitimate Applications

Browser hijackers are a type of malware that modifies a web browser’s settings without the user’s permission. Generally a browser hijacker...

McAfee Labs

Big, Hard-to-Solve Problems

Improving the Lifecycle of Threat Defense Effectiveness When a new security tool or technique is released, Version 1.0 is usually...

McAfee Labs

Beyond Clubhouse: Vulnerable Agora SDKs Still in Widespread Use

On February 17th, 2021, McAfee disclosed findings based on a 10-month long disclosure process with major video conferencing vendor Agora,...

Internet Security Mobile Security

Beware: Zombie IoT Botnets

The ghosts and ghouls of October have come and gone, but the dangers lurking behind virtual walls have hardly disappeared....

McAfee Labs

Beware the Rapid Proliferation of Cyber-warfare Capabilities

Governments across the globe continue to invest in cyber warfare operations.   Over 60 countries, a number that is rising, currently...

Internet Security

Beware of These Voting Scams Happening Now

With the election quickly approaching, it’s essential to be informed and cautious about the growing number of voting scams. Scammers...

Family Safety Privacy & Identity Protection

Beware of the Risks of Online Gaming and Fantasy Football

August may mean the last days of summer vacation and start of back to school for some, but for die...

Internet Security Mobile Security

Beware of Social Media Scams

Social media is a great place to connect with friends and family. Unfortunately, it is also a great place for...

Mobile Security Privacy & Identity Protection

Beware of Malicious Mobile Apps

With the surge in the usage of mobile phones, there has been a concurrent increase in malicious activities targeting these devices. One common technique used by hackers is to corrupt legitimate applications. Android devices, in particular, see increases in malware targeting mobile phones year by year.

Mobile Security McAfee Labs

Beware of Impostor Android Apps Using Fake ID

Recently discovered, an Android vulnerability called Fake ID allows apps to impersonate other apps by copying their identity. Each app...

How To Guides and Tutorials Mobile Security

Beware of BRATA: How to Avoid Android Malware Attack

Cybercriminals go to great lengths to hack personal devices to gather sensitive information about online users. To be more effective, they make significant investments in their technology. Also, cybercriminals are...

Family Safety

Beware of Back-To-School Scams

These days it seems that there is a scam for every season, and back-to-school is no different. From phony financial...

Family Safety

Beware Cloned Facebook Profiles

If you have had a Facebook friend request from a friend that you are sure you already have then –...

How To Guides and Tutorials

Best Ways to Check for a Trojan on Your PC

The internet has changed our lives in more ways than we can count. These days, anything we desire — whether...

Mobile Security Privacy & Identity Protection

Best Smart Home Devices for a Connected New Year

 Like many of you, I spent a lot of time at home this year, but it came with an unexpected...

McAfee Labs

Best practices for preventing Dridex infections

Mitigating the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of...

Life at McAfee

Best Practices for Adapting to a Remote Work Lifestyle 

As our world continues to evolve, we have been forced to adapt accordingly. Navigating change can be difficult for many, so...

Mobile Security Family Safety

BeReal – The Newest Kid On The Social Media Block

Without doubt, the biggest criticism we all have of social media is that everyone always looks fabulous! And while we...

McAfee Labs

Beneath the Surface: How Hackers Turn NetSupport Against Users

NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we delve...

Mobile Security Privacy & Identity Protection

Behind the Mobile App: Your Data Exposed

Taylor Swift dropped a musical explosion when she released her music video for the song “Bad Blood” earlier this year....

McAfee Labs

Behind the CAPTCHA: A Clever Gateway of Malware

Authored by Yashvi Shah and Aayush Tyagi Executive summary McAfee Labs recently observed an infection chain where fake CAPTCHA pages...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

Before You Share, Ask Yourself “Is This TMI?”

Social networks and new online services make it easy to share the details of our lives, perhaps too easily. With...

Mobile Security

Before You Download: Steer Clear of Malicious Android Apps

Cybercriminals like to get in on a good thing. Case in point, mobile apps. We love using apps and they love making bogus ones—malicious apps designed to harm phones and possibly the person using them. The good news is that there are ways you can spot these imposters. These six ...

Privacy & Identity Protection

Before Getting Rid of Your Old Devices, Say “Goodbye” to Lingering Data

When you think about it, the lifecycle of our devices is pretty short. Within a few years of getting a...

Family Safety

Becoming ‘InstaFamous’ – The Apps the Kids are Using Now: Instagram LikeBots

InstaFamous: A person who is famous due to a high amount of followers on Instagram. The Instagram ‘popular’ page boasts...

McAfee News Privacy & Identity Protection

Becoming an Experimental Marketer

A few years ago, Optimizely decided to try something different for the 2013 Dreamforce event, a developer and user mega-conference...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

Beat Black Friday Scammers: Secure Your Online Purchases From Fake Payment Processors

They see you when you’re shopping, they know when you click “pay” – cybercriminals, that is. With Black Friday and...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top