Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security Mobile Security

Beware of Social Media Scams

Social media is a great place to connect with friends and family. Unfortunately, it is also a great place for...

McAfee Labs

Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware

The Roaming Mantis smishing campaign has been impersonating a logistics company to steal SMS messages and contact lists from Asian...

How To Guides and Tutorials McAfee Labs

How to Stop the Popups

McAfee is tracking an increase in the use of deceptive popups that mislead some users into taking action, while annoying...

Internet Security Privacy & Identity Protection

World Password Day: Make Passwords the Strongest Link in Your Online Security

World Password Day isn’t the most popular day on the calendar, but it’s an important reminder that good password hygiene...

Mobile Security

Fraudulent Apps that Automatically Charge you Money Spotted in Google Play

Google’s Android operating system has been a boon for the average consumer. No other operating system has given so much...

Family Safety

PC Gamers (and Parents of Gamers) Rejoice!

Of all the pastimes that took off during the pandemic, it’s not surprising that online gaming was one of them....

Internet Security Mobile Security

The Mothers of Invention: Women Who Blazed the Trail in Technology

It’s easy to imagine where we would be without women in technology. We’d be poorer for it. With Mother’s Day upon...

How To Guides and Tutorials

What Is Adware? A Definitive Guide

We live in a digital world and a lot of our daily activities are online, including banking, grocery shopping, and...

How To Guides and Tutorials Mobile Security

Beware of BRATA: How to Avoid Android Malware Attack

Cybercriminals go to great lengths to hack personal devices to gather sensitive information about online users. To be more effective, they make significant investments in their technology. Also, cybercriminals are...

McAfee Labs

Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation

Executive Summary Many malware attacks designed to inflict damage on a network are armed with lateral movement capabilities. Post initial...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top