Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Family Safety

Report: Gaming Addiction is a Real Thing. So What Can Parents Do Next?

It’s one of my biggest parenting regrets to date: About a decade ago, I failed to put limits around my teen’s...

McAfee Labs

Report Highlights Enterprise Biometric Vulnerabilities, Opportunities

Authentication in the modern enterprise is becoming more difficult. The risks are rising, but adding more security controls can impede...

Privacy & Identity Protection Security News

Report Finds Some Health Apps Aren’t Healthy for Your Privacy

One of the big features in today’s Internet-of-Things-centric world is the ability to effortlessly track and record health-related data. In...

Internet Security Privacy & Identity Protection Security News

Remote Jeep Hacking Successful: Time to Patch Your Car?

This blog post was written by Bruce Snell. Next month I’ll be moving back to the US after a few...

McAfee Labs

Remote Jackpot: Hacking ATMs

Isn’t it just everybody’s dream: to walk up to an ATM, swipe your card, get a flashy screen reading “We...

McAfee Labs

Remote iPhone Jailbreak Using PDF Exploit Should Serve as Wake-Up Call

Like many iPhone users, I “jailbreak” my iPhone. I do this for many reasons, but mainly for console-level access and...

McAfee News

Reimagining mobile security for the way we live our lives today, tomorrow, and beyond.

Online is a little different for everyone How do you connect online these days? I’ll give you an example from my...

McAfee Labs

Redline Stealer: A Novel Approach

Authored by Mohansundaram M and Neil Tyagi A new packed variant of the Redline Stealer trojan was observed in the...

McAfee Labs

Red Kit an Emerging Exploit Pack

Exploit kits are toolkits that are used to build malware components such as binaries and scripts. They automate the exploitation...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top