[breadcrumb]
McAfee Labs

XLSM Malware with MacroSheets

Written by: Lakshya Mathur Excel-based malware has been around for decades and has been in the limelight in recent years. During the second half of 2020, we saw...

How To Guides and Tutorials Internet Security Privacy & Identity Protection

How to Protect Yourself From XLoader Malware

Picture this: you open your MacBook and see an email claiming to be from your favorite online store. In the email,...

Internet Security Mobile Security

Is Your Peloton Spinning Up Malware?

[Disclaimer: The McAfee ATR team disclosed this vulnerability to Peloton and promptly started working together to responsibly develop and issue a patch within...

Security News Internet Security

Apple Users: This macOS Malware Could Be Spying on You

In 2018, Macs accounted for 10% of all active personal computers. Since then, popularity has skyrocketed. In the first quarter of 2021, Macs experienced 115% growth...

Mobile Security

Fraudulent Apps that Automatically Charge you Money Spotted in Google Play

Google’s Android operating system has been a boon for the average consumer. No other operating system has given so much...

How To Guides and Tutorials Mobile Security

Beware of BRATA: How to Avoid Android Malware Attack

Cybercriminals go to great lengths to hack personal devices to gather sensitive information about online users. To be more effective, they make significant investments in their technology. Also, cybercriminals are...

Security News Mobile Security

Millions Affected by Malware Attributed to Android Barcode-Scanning App 

We’ve all come to a realization that we don’t go anywhere without our phone. It’s a utility that helps us...

How To Guides and Tutorials Internet Security

Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected

Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected Every few weeks, there seems to be breaking...

Family Safety

AI & Your Family: The Wows and Potential Risks

From cell phones with built-in smart assistants to home assistants that carry out voice commands, from social networks that determine what content we see to music apps that curate playlists based on our preferences, AI has its footprints everywhere. Therefore, it’s integral to not only embrace the wows of this ...

Internet Security Mobile Security

US-B Careful: Public iPhone Chargers Lie in Wait

It is common knowledge that connecting your devices to public Wi-Fi can expose them to potential malware and other security risks. But have you ever considered the dangers that might be lurking within public USB chargers?

Subscribe to McAfee Securing Tomorrow Blogs