Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee Labs

Analysis of LooCipher, a New Ransomware Family Observed This Year

Co-authored by Marc RiveroLopez. Initial Discovery This year seems to again be the year for ransomware. Notorious attacks were made...

McAfee Labs

Analysis of Chrysaor Keylogging Mechanism Shows Power of Simple Malicious Code

Many attacks on mobile devices use social engineering to initially infect a victim’s system. They download malware and elevate privileges...

McAfee Labs

Analysis of a Chrome Zero Day: CVE-2019-5786

1. Introduction On March 1st, Google published an advisory [1] for a use-after-free in the Chrome implementation of the FileReader...

McAfee Labs

An Overview of Messaging Botnets

In the quarterly McAfee Threats Reports we offer our readers some charts on the prevalence of messaging botnets. For the...

McAfee Labs

An Overview of Malware Self-Defense and Protection

Many malware authors spend a great deal of time and effort to develop complex code. Their success depends on a...

McAfee Labs

An Overall Philosophy on the Use of Critical Threat Intelligence

The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and...

McAfee Labs

An Inside Look into Microsoft Rich Text Format and OLE Exploits

There has been a dramatic shift in the platforms targeted by attackers over the past few years. Up until 2016,...

Internet Security Mobile Security Privacy & Identity Protection

An Inkjet Printer is All You Need to Hack a Smartphone’s Fingerprint Scanner

No two fingerprints are alike. It’s an undisputable fact that’s allowed humanity to make huge strides in criminal justice, record-keeping,...

Family Safety

An Aware Child is Safer Online

A Parent’s Handy Primer on Cyber Vocabulary – Part II Welcome back to our primer! As you may recall, our...

Family Safety

An Aware Child is Safer Online

A Parent’s Handy Primer on Cyber Vocabulary – Part IV Aaaaaand, we are back! *drum rolls* This week’s topic is...

Internet Security Mobile Security

America’s Dirty Little Secrets: Opening the Door to Protected Data

It’s 2018. Digital assistants have started taking over our homes, with adoption growing tenfold. These smart speakers know everything about...

McAfee Labs

Amazon Gift Card Malware Spreading via SMS

McAfee Labs recently published its Hacking the Human OS report, which details a number of ways in which cybercriminals rely...

Mobile Security Family Safety

Almost 5% of Smartphones Lost Every Year

McAfee and Ponemon Institute recently released “The Lost Smartphone Problem,” a study that attempts to determine how many employees’ smartphones...

Family Safety

Alleged ‘Momo Challenge’ Reminds Parents to Monitor Online Content

Editor’s Note: This blog post includes disturbing content and mentions of suicide. Internet challenges have been going on for years....

Privacy & Identity Protection

All-New Ransomware Coverage Opens Up the Path to Recovery

Our all-new ransomware coverage is now available, ready to help just in case—all backed by expert advice to help you...

Life at McAfee

All Work and No Play? Not at McAfee!

By Srinidhi, Software Quality Engineer There’s more to life than work.   It’s a commonly held and often stated view, but companies...

Internet Security

AI in the Wild: Malicious Applications of Mainstream AI Tools

It’s not all funny limericks, bizarre portraits, and hilarious viral skits. ChatGPT, Bard, DALL-E, Craiyon, Voice.ai, and a whole host...

Internet Security

AI Enters the Mix as Online Job Scams Continue to Rise

You didn’t get the job. Worse yet, you got scammed. Because the opening was never real in the first place....

Privacy & Identity Protection

AI chatbots are becoming romance scammers—and 1 in 3 people admit they could fall for one

It started with a DM.  For five months, 25-year-old computer programmer Maggie K. exchanged daily messages with the man she...

Family Safety

AI & Your Family: The Wows and Potential Risks

From cell phones with built-in smart assistants to home assistants that carry out voice commands, from social networks that determine what content we see to music apps that curate playlists based on our preferences, AI has its footprints everywhere. Therefore, it’s integral to not only embrace the wows of this ...

McAfee Labs

Agent Tesla’s Unique Approach: VBS and Steganography for Delivery and Intrusion

Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the...

McAfee Labs

Adylkuzz CoinMiner Spreading Like WannaCry

The last few days have been very busy for security teams all around the globe due to the nasty ransomware...

Internet Security

Advances in Our Use of AI Keep You Even Safer Online

AI is on your side. In fact, it’s kept you safer online for some time now.  Now that scammers and...

Mobile Security McAfee Labs

Adult Voice-Service Apps on Google Play Japan Charge Users Without Notice

McAfee has reported on increasing fraudulent Android applications on Google Play in Japan this year, including one-click fraud applications and...

Internet Security How To Guides and Tutorials

Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected

Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected Every few weeks, there seems to be breaking...

Mobile Security McAfee Labs

Adobe Flash Player Installer Scams Reappear on Google Play

Adobe Flash Player has been a boon to Android malware creators for a long time. These developers have taken advantage...

Internet Security

Adidas Data Breach: What Consumers Need to Know and How to Protect Yourself

German sportswear giant Adidas has confirmed a significant cybersecurity incident that compromised customer personal information through an attack on their...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top