Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security

This Valentine’s Day Let Your Digital Life Take a Backseat

A couple of decades ago, Valentine’s Day was all about red roses, exchanging cards, dinner dates, hand-holding and whispering sweet...

Family Safety

This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too

This Valentine’s Day, Don’t Just Think About “Lip lock” But Give “Data Lock” A Thought Too Love is in the...

Family Safety Privacy & Identity Protection

This Valentine’s Day, Share Your Love, Not Your Personal Data

This blog post was written by Bruce Snell. Valentine’s Day is just around the corner, are you ready?  Have you...

Security News

This Week in Scams: $16.6 Billion Lost, Deepfakes Rise, and Google Email Scams Emerge

Welcome to the first edition of This Week in Scams, a new weekly series from McAfee breaking down the latest...

Internet Security

This World Password Day, Here’s How a Password Manager Can Simplify Your Life

Passwords: we entrust our most important data to these strings of letters, numbers, and special characters. So, we should make...

Internet Security Privacy & Identity Protection

This Year at Black Hat: Danger Drones and Thermostat Ransomware

This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it...

Internet Security Mobile Security Privacy & Identity Protection

Thoughts from the conference floor: securing the connected home

This blog post was written by Nick Viney. In my line of work, you read and hear a lot about...

McAfee Labs

Threat Actors Employ COM Technology in Shellcode to Evade Detection

COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...

McAfee Labs

Threat Actors Taking Advantage of FTX Bankruptcy 

Authored by Oliver Devane  It hasn’t taken malicious actors long to take advantage of the recent bankruptcy filing of FTX,...

McAfee Labs

Threat Actors Use Encrypted Office Binary Format to Evade Detection

This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...

McAfee Labs

Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack

This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...

McAfee Labs

Threat Report: Don’t Join Blockchain Revolution Without Ensuring Security

On May 19 researchers discovered a series of vulnerabilities in the blockchain-based EOS platform that can lead to remote control...

Life at McAfee

Three Lessons I’ve Learned Battling Cancer and Cybercriminals

By Celeste, Senior Principal Engineer With our people at the heart, we are McAfee As Chief Data Scientist, Senior Principal...

Privacy & Identity Protection

Three Reasons You Need a VPN

You know what a VPN is, but the question remains—why do you need a VPN?  There’s one good reason. Your...

Family Safety

Three Signs Your Teen May Be Sexting and What to Do About It

I will be the first to confess that sometimes when I look at my kids, my eyes do not work....

Family Safety

Three Words Every Parent Needs to Know

  Have you noticed that commonplace words don’t quite mean what they used to? It’s a subtle but alarming shift...

Mobile Security Family Safety

TikTok Challenge, Hoop App, and Other Headlines You May Have Missed

Digital news that affects families seems to be dominating the headlines these days. To keep parents in the know, here...

Mobile Security Family Safety

TikTok Update: Dangerous Viral Challenges & Age Restrictions

TikTok Update: Dangerous Viral Challenges & Age Restrictions It’s popular. It’s uplifting. It’s creative. It’s entertaining. It can also be...

Family Safety

Time to make your Kids aware of Digital Fraud?

Long ago I watched a movie where the hero returned home after a harrowing experience only to find that an...

Internet Security Mobile Security

Time to Take a Good, Hard Look at Your Cybersecurity Health

What happens when your livelihood is at stake, thanks to someone stealing your identity or draining your account? The real-life...

Family Safety

Timeless Principles to Help Your Child Develop Social Superpowers

“You can make more friends in two months by becoming interested in other people than you can in two years...

McAfee Labs

Timeline of Bitcoin Events Demonstrates Online Currency’s Volatility

The buzz about Bitcoin has moved from online circles to mainstream media sources. Last week’s news of the collapse of...

Internet Security Mobile Security

Tinder Not So Tender

Tinder is a kind of modern day ‘Hot or Not’ mobile dating app. It finds matches based on location, then...

McAfee Labs

Tips for Effective Threat Hunting

This blog was co-written by Ramnath Venugopalan. In May, McAfee surveyed more than 700 IT and security professionals around the...

Internet Security Privacy & Identity Protection

To Preserve Bandwidth, Gogo Inflight Executes a Man-in-the-Middle Attack

Early last week, Gogo Inflight, a provider of in-flight Internet access for airlines, caught a lot of headlines for a...

Internet Security Privacy & Identity Protection

To Realize a Better Healthcare System, The IOTs Needs to be Secured

The adage, “an apple a day keeps the doctor away,” has, according to The Washington Post, been around since the...

Family Safety

To Skype or Not to Skype: What Parents Need to Know About Video Chat

Captain Kirk isn’t the only one who gets to video chat these days. If your kids have a smart phone...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top