Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Security News Internet Security McAfee News

Career change? Cybersecurity companies are hiring.

Career change? Cybersecurity companies are hiring. If you’re thinking career change or career shift, there’s a field that has an...

Privacy & Identity Protection

Capital One Data Breach: How Impacted Users Can Stay More Secure

Capital One is one of the 10 largest banks based on U.S. deposits. As with many big-name brands, cybercriminals see...

Family Safety

Can’t Keep Up? 6 Easy Things You Can Do to Keep Your Kids Safe Online

Having a hard time doing what needs to be done to keep your kids safe online? Do you mentally shrink...

McAfee Labs

Can Zealous Security Cause Harm?

Good security requires balancing risks, costs, and usability. Too much or too little of each can be unhealthy and lead...

Mobile Security Family Safety

Can Your Wearable Health Monitors Be Compromised?

Wearable health devices are designed to give you more control over your body and your data.  But in 2026, the...

Family Safety

Can You Decode Your Teen’s Texting Language?

It’s hard to believe, right, parents? In just a blink or two, you went from being the teenager dropping cool phrases like...

Internet Security

Can Video Game “Mods” Expose Players to Malware?

“Hackable?” host Geoff Siskind’s son is a huge fan of the world-building computer game Minecraft — and downloads “mods” for...

Privacy & Identity Protection

Can Thieves Steal Identities With Only a Name and Address?

Can thieves steal identities with only a name and address?   In short, the answer is “no.” Which is a good...

Family Safety

Can Parental Controls Can Help You Create Good Habits?

Molding and shaping our kids while we can is every parent’s dream. When kids are young – and sweet! –...

How To Guides and Tutorials

Can My Phone Be Tracked If Location Services Are Off?

Your smartphone comes with built-in location services, which are useful if you lose it or if you use an app...

Internet Security Privacy & Identity Protection

Can Hackers Make Drones Drop out of the Sky?

While Amazon hasn’t begun using autonomous drones to deliver packages (yet), the aerial technology is becoming more and more popular....

Internet Security

Can Apple Macs get Viruses?

Can Apple computers get viruses? Absolutely! Learn which viruses and malware Apple computers and other Mac devices are vulnerable to so that you can be on the lookout to protect against them.

Internet Security Privacy & Identity Protection

Can All-in-One Printers Be Hacked? “Hackable?” Sets the Fax Straight

The heyday of fax technology may have been in the 80s, but all-in-one printers found throughout homes and offices often...

McAfee Labs

Call an Exorcist! My Robot’s Possessed!

Overview As part of our continued goal of helping developers provide safer products for businesses and consumers, we here at...

McAfee Labs

CactusTorch Fileless Threat Abuses .NET to Infect Victims

McAfee Labs has noticed a significant shift by some actors toward using trusted Windows executables, rather than external malware, to...

Internet Security Mobile Security

Bypassing Your Passcode: How One Online Hack Can Unleash Your Photos and Texts

  You keep some of your most personal information on your phone. Special photos, hundreds of contacts, important emails, private...

McAfee Labs

Bypassing Microsoft’s Patch for the Sandworm Zero Day, the Root Cause

On October 21, we warned the public that a new exploitation method could bypass Microsoft’s official patch (MS14-060, KB3000869) for...

Internet Security Privacy & Identity Protection

Bypassing Microsoft’s Patch for the Sandworm Zero Day

This is the second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch bypass. Check out...

Internet Security Mobile Security

BYOD: Balancing Convenience and Security

It lies next to you as you sleep, comes with you to work, rides home with you in your car...

Internet Security Privacy & Identity Protection

Buying Tickets for Beyoncé’s Cowboy Carter Tour? Don’t Let Scammers Ruin Your Experience

Beyoncé has officially announced her Cowboy Carter world tour, and the excitement is through the roof! With her last tour...

Security News Privacy & Identity Protection Family Safety

Buying Harry Styles Tickets? Avoid These Common Ticket Scams

As Harry Styles concert tickets go on sale for his first tour in years, cybersecurity experts warn that the same...

McAfee Labs

Business Email Compromise Hurts Your Organization

As many workers do today, you probably get emails from your boss asking you to perform various tasks. You may...

How To Guides and Tutorials Internet Security

Burning Man Is Coming: How to Watch out for Ticket Scammers

As the winter months fade and spring begins to creep up, many millennials and Gen Zers set their sights on...

McAfee Labs

Buran Ransomware; the Evolution of VegaLocker

McAfee’s Advanced Threat Research Team observed how a new ransomware family named ‘Buran’ appeared in May 2019. Buran works as...

Security News Internet Security McAfee News

Building Bridges to a More Connected Security Environment

For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were...

Security News Internet Security

Bug Alert! All 330 Million Twitter Users Need to Change Their Passwords Immediately

Tweet, tweet! No, that’s not a bird you’re hearing outside your window, that’s Twitter kindly reminding you to change your...

How To Guides and Tutorials Internet Security Privacy & Identity Protection Mobile Security Family Safety

Brushing Scams: What They Are and How to Stay Safe From Unsolicited Packages

It’s an increasingly common surprise: a package shows up at your door with your name and your address…but you never ordered...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top