Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

How To Guides and Tutorials

What Are Ransomware Attacks? An In-Depth Guide

Ransomware is a malicious type of malware that cybercriminals use to encrypt the target’s files or lock their computer systems,...

Mobile Security

What Are Serverless Apps?

The smartphone market has exploded in recent years, leading to the development of over 4 million mobile apps. For mobile...

Internet Security

What Are Tailgating Attacks and How to Protect Yourself From Them

Whether you’re spending time on the web or working in the office, you want peace of mind knowing that you...

How To Guides and Tutorials Privacy & Identity Protection

What Are the 6 Types of Identity Theft

You crack open your credit card statement and something seems … off. Maybe it’s a couple of small online purchases...

Family Safety

What are the Pros and Cons of Snooping on Your Kids Online?

I’ve changed my mind on the snooping question quite a bit since I began writing about family safety over five...

Internet Security

What Are the Risks of Clicking on Malicious Links?

A simple click of a link can’t cause any trouble, right? Wrong.  It doesn’t matter if you quickly close out...

Family Safety Privacy & Identity Protection

What Are the Risks of Geo-Location?

Using your mobile’s built-in global positioning system (GPS) functionality allows location-based services (or geo-location) to locate and publish information about...

Internet Security Mobile Security

What CES Can Show Us About Evolving Consumer Security Needs: A Timeline

Appropriately dubbed the ‘Global Stage for Innovation,’ it’s no wonder CES showcases the most cutting-edge consumer technologies coming out in...

Mobile Security Family Safety

What Could (Pokémon) Go Wrong?

This blog was written by Bruce Snell. If you’re like me, your Facebook feed (and Twitter, Instagram, Vine, etc) has...

McAfee Labs

What CVE-2020-0601 Teaches Us About Microsoft’s TLS Certificate Verification Process

By: Jan Schnellbächer and Martin Stecher, McAfee Germany GmbH This week security researches around the world were very busy working...

Privacy & Identity Protection

What Do Social Media Companies Know About You?

What do social media companies really know about you? It’s a fair question. And the quick answer is this: the more you...

Family Safety

What Do Your Kids Want To Be When They Grow Up?

When I was 8, I was completely obsessed with being an air hostess ‘when I grew up.’ The thought of travelling the...

Internet Security Family Safety

What Does It Take To Be Digitally Secure?

Let’s get one thing straight: it’s no longer possible to deny that your life in the physical world and your...

Privacy & Identity Protection

What Does Your Password Say About Your Preferences?

Passwords say a lot about us. They speak to what we prioritize, what we hold dear. So when I recently saw my wife’s password included...

Internet Security How To Guides and Tutorials

What Does “Connection is Not Private” Mean?

Have you ever visited a site that triggers a “your connection is not private” or “your connection is not secure”...

McAfee Labs

What Drives a Ransomware Criminal? CoinVault Developers Convicted

How often do we get a chance to learn what goes on in the minds of cybercriminals? Two members of...

Family Safety

What Else Kids Give Away When They Share Their Personal Passwords

Tweens and teens share clothes, secrets, and homework notes but there’s something else your kids may be sharing that isn’t...

Internet Security

What Everyone Can Learn from The Mark Zuckerberg Hack

When we were children, our role models seemed invincible. Could any five-year-old imagine a Superman who was less than perfect?...

Family Safety

What Families Can Learn from the #HisNameIsCayden Hashtag

A recent Facebook post that went viral cost an Atlanta man his job and opened an important conversation for families around...

Internet Security Privacy & Identity Protection

What is a Backdoor Threat?

Did you accidentally leave the back door open? This thought can be scary because you know that leaving the back...

Privacy & Identity Protection

What is a Botnet?

The word botnet or bot is short for robot network.  A botnet is a group of Internet-connected personal computers that...

Internet Security Privacy & Identity Protection

What Is a Botnet?

What is a botnet? And what does it have to do with a toaster? We’ll get to that. First, a...

Internet Security

What is a Botnet? And What Does It Have to Do with Protecting “Smart Home” Devices?

The pop-up toaster as we know it first hit the shelves in 1926, under the brand name “Toastmaster.” With a...

Internet Security Privacy & Identity Protection

What is a Cache?

Perhaps someone has told you that you need to “clear your cache,” but what does this mean and why should...

Internet Security

What Is a Crypto Wallet and How to Keep Your Wallet Secure?

A-list celebrities and social media influencers are now adding their voices to the roar of other cryptocurrency fans asking you...

How To Guides and Tutorials

What Is a Data Breach and How Do You Avoid It?

A data breach occurs when cybercriminals steal information from an organization’s database without permission from the owner or administrator. Data...

How To Guides and Tutorials

What Is a Data Broker?

A data broker is an organization that makes money by collecting your personal information, analyzing it, and licensing it out to...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top