Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Family Safety

Three Signs Your Teen May Be Sexting and What to Do About It

I will be the first to confess that sometimes when I look at my kids, my eyes do not work....

Family Safety

Three Words Every Parent Needs to Know

  Have you noticed that commonplace words don’t quite mean what they used to? It’s a subtle but alarming shift...

Mobile Security Family Safety

TikTok Challenge, Hoop App, and Other Headlines You May Have Missed

Digital news that affects families seems to be dominating the headlines these days. To keep parents in the know, here...

Mobile Security Family Safety

TikTok Update: Dangerous Viral Challenges & Age Restrictions

TikTok Update: Dangerous Viral Challenges & Age Restrictions It’s popular. It’s uplifting. It’s creative. It’s entertaining. It can also be...

Family Safety

Time to make your Kids aware of Digital Fraud?

Long ago I watched a movie where the hero returned home after a harrowing experience only to find that an...

Mobile Security Internet Security

Time to Take a Good, Hard Look at Your Cybersecurity Health

What happens when your livelihood is at stake, thanks to someone stealing your identity or draining your account? The real-life...

Family Safety

Timeless Principles to Help Your Child Develop Social Superpowers

“You can make more friends in two months by becoming interested in other people than you can in two years...

McAfee Labs

Timeline of Bitcoin Events Demonstrates Online Currency’s Volatility

The buzz about Bitcoin has moved from online circles to mainstream media sources. Last week’s news of the collapse of...

Mobile Security Internet Security

Tinder Not So Tender

Tinder is a kind of modern day ‘Hot or Not’ mobile dating app. It finds matches based on location, then...

McAfee Labs

Tips for Effective Threat Hunting

This blog was co-written by Ramnath Venugopalan. In May, McAfee surveyed more than 700 IT and security professionals around the...

Internet Security Privacy & Identity Protection

To Preserve Bandwidth, Gogo Inflight Executes a Man-in-the-Middle Attack

Early last week, Gogo Inflight, a provider of in-flight Internet access for airlines, caught a lot of headlines for a...

Internet Security Privacy & Identity Protection

To Realize a Better Healthcare System, The IOTs Needs to be Secured

The adage, “an apple a day keeps the doctor away,” has, according to The Washington Post, been around since the...

Family Safety

To Skype or Not to Skype: What Parents Need to Know About Video Chat

Captain Kirk isn’t the only one who gets to video chat these days. If your kids have a smart phone...

Family Safety

To Unplug Or Not To Unplug? That Is The Holiday Question

If you’re heading away these holidays, it’s likely you’ve workshopped the idea of whether to ‘unplug’ – and I’m not...

McAfee Labs

Today’s Connected Cars Vulnerable to Hacking, Malware

The McAfee Advanced Threat Research team recently published an article about threats to automobiles on the French site JournalAuto.com. Connected cars are growing rapidly in number and represent the next big step in personal transportation.

McAfee News

Today’s Trends: Consumers Prioritize Protection Over Convenience

People have made it clear. They’re feeling more exposed to online threats and want stronger protection. Our 2022 Trends Study...

Mobile Security Internet Security McAfee News

Together is Power: Why McAfee Partnered With British Telecom Group

Cybersecurity threats are growing in both number and strength day by day, making it almost impossible for any one person...

Security News McAfee News

Together We Are Forming a Powerful Alliance Against the Bad Guys

McAfee Security Innovation Alliance (SIA) is a technology ecosystem designed to assemble the world’s leading security innovations to form a...

Internet Security Privacy & Identity Protection

Together, We Block and Tackle to Give You Peace of Mind

As a leader in cybersecurity, we at McAfee understand that every aspect of your digital life has potential weak spots...

Internet Security

Tom Hanks Warns Fans: The Dark Side of AI Scams 

Tom Hanks, one of the most recognizable faces in the world, warns that scammers have swiped his likeness in malicious...

Family Safety

Too Much Tech: 4 Steps to Get Your Child to Chill on Excessive Snapchatting

We were in the midst of what I believed to be an important conversation. “Just a sec mom,” she said promptly...

Internet Security

Top 10 COVID-19 Scams: How to Stay Protected

The COVID-19 pandemic flipped the world on its head in so many ways. Offices and schools stood empty while living...

How To Guides and Tutorials Internet Security

Top 10 Tips To Stay Safe Online

With hacks, scams, cybercriminals, malware and more, the internet can feel like a dangerous place these days. And, the recent...

McAfee Labs

Top 3 Phishing Attacks Use Similar Tricks

Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing...

Internet Security

Top 5 Most Dangerous Email Subject Lines

In this article, we delve deeper into the tactic that is a favorite among cybercriminals – ‘phishing‘ via emails. We focus on the trickiest and most dangerous email subject lines that have been commonly used in worldwide phishing emails. Recognizing these ‘ baits’ can be your first step towards safeguarding ...

McAfee News

Top 5 Reasons To Participate in the McAfee Virtual Sales Kickoff

In 2013 we remain committed to investing in, growing with and optimizing for you, our channel partners. A prime example...

McAfee Labs

Top 5 Things to Know About Recent IoT Attacks

While the IoT offers tremendous benefits, such as allowing users to monitor their homes or check the contents of their refrigerators remotely, it also presents a significant risk. For hackers, each IoT device represents a potential recruit for their bot armies.

Subscribe to McAfee Securing Tomorrow Blogs

Back to top