Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Mobile Security Family Safety

What Parents Need To Know About TikTok’s New Screen Time Limits

Social media platforms often get a hard time by us parents. But a recent announcement by TikTok of industry first...

How To Guides and Tutorials Privacy & Identity Protection

How To Prevent Ransomware

Ransomware. Even the name sounds scary.  When you get down to it, ransomware is one of the nastiest attacks a...

Internet Security

What is a Zero-Day Threat?

“Zero-day threat.” It may sound like the title of a hit film, yet it’s anything but.   It’s a previously unknown...

Internet Security

What is a Botnet? And What Does It Have to Do with Protecting “Smart Home” Devices?

The pop-up toaster as we know it first hit the shelves in 1926, under the brand name “Toastmaster.” With a...

Mobile Security McAfee Labs

Goldoson: Privacy-invasive and Clicker Android Adware found in popular apps in South Korea

Authored by SangRyol Ryu McAfee’s Mobile Research Team discovered a software library we’ve named Goldoson, which collects lists of applications...

Mobile Security Privacy & Identity Protection

How Private is WhatsApp Really? Staying Safer While Using the App.

It’s important to note that the only time your communications are encrypted is when they’re in transit. They’re otherwise plain...

How To Guides and Tutorials Privacy & Identity Protection

How To Prevent Ransomware

Ransomware. Even the name sounds scary.  When you get down to it, ransomware is one of the nastiest attacks a...

Mobile Security

Everything You Need to Know to Avoid a Man-in-the-Middle Mobile Attack

Monkey in the middle, the beloved playground staple, extends beyond schoolyards into corporate networks, home desktops, and personal mobile devices...

McAfee Labs

Extortion Fraud is Still on the Rise

Authored by Lakshya Mathur and Sriram P  McAfee Intelligence observed a huge spike in extortion email frauds over the past month....

Mobile Security McAfee Labs

Fakecalls Android Malware Abuses Legitimate Signing Key

Authored by Dexter Shin  McAfee Mobile Research Team found an Android banking trojan signed with a key used by legitimate...

Mobile Security McAfee Labs

HiddenAds Spread via Android Gaming Apps on Google Play

Authored by Dexter Shin  Minecraft is a popular video game that can be played on a desktop or mobile. This...

Mobile Security

7 Tips to Protect Your Devices and Private Information from Ransomware

Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly...

How To Guides and Tutorials Mobile Security

How to Limit Location Tracking on Your Phone

We all know that our phones know a lot about us. And they most certainly know a lot about where...

How To Guides and Tutorials Privacy & Identity Protection

How To Create The Strongest Passwords

Some of the strongest passwords you can use are the ones you don’t have to remember.  Strange as that may...

How To Guides and Tutorials Mobile Security Family Safety

How To Be Safe On WhatsApp

I’m betting you have WhatsApp on your phone. Or, if you don’t – I’m quite sure a member of your...

McAfee Labs

Deconstructing Amadey’s Latest Multi-Stage Attack and Malware Distribution

Authored by By Yashvi Shah  McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at...

McAfee Labs

New Wave of SHTML Phishing Attacks

Authored By Anuradha McAfee Labs has recently observed a new wave of phishing attacks. In this wave, the attacker has...

How To Guides and Tutorials Privacy & Identity Protection

How Senior Adults Can Safeguard Their Privacy

Smart speakers. Banking online. Location tracking. If you are a senior adult, there’s no doubt, the digital leaps and bounds...

McAfee Labs

GULoader Campaigns: A Deep Dive Analysis of a highly evasive Shellcode based loader

Authored by: Anandeshwar Unnikrishnan Stage 1: GULoader Shellcode Deployment  In recent GULoader campaigns, we are seeing a rise in NSIS-based...

How To Guides and Tutorials Family Safety

How to Protect Your Family’s Privacy on Twitter: A Guide for Parents and Kids

It’s no secret that when it comes to social networks, teen preferences can change dramatically from year to year. That...

How To Guides and Tutorials Privacy & Identity Protection

How to Avoid Phishing Attacks on Your Smartphones and Computers

Ping, it’s a scammer!  The sound of an incoming email, text, or direct message has a way of getting your...

Internet Security

Independent Lab Tests Show that McAfee Stops Malware Dead in Its Tracks

Concerned about ransomware? McAfee stops it dead in its tracks.  Newly published findings from the independent labs at AV-TEST show...

Family Safety

Is My Child Being Cyberbullied Or Is It Just Banter?

If you were to ask me what I consider to be the most attractive attribute in a person, it would...

Mobile Security

“Where Did I Leave My Phone?” Protecting Your Phone from Loss and Theft

Maybe you know that sinking feeling all too well. “Where did I leave my phone?”  The minutes pass as you...

Internet Security

Steer Clear of Rip-offs: Top Tips for Safer Online Shopping

Everyone loves a great deal when they shop online. Until they discover it’s a rip-off.  Social media ads for vintage...

Mobile Security Family Safety

Instagram Safety for Kids: Protecting Privacy and Avoiding Risks

If you’re a parent of a teen, there’s a good chance that Instagram is the culprit behind a good chunk...

Mobile Security

Mobile Spyware—How You Can Keep Stalkers Off Your Phone

When you wind up with mobile spyware, you may wind up with a stalker on your phone.  In its most...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top