All Security Awareness Reports and Resources

McAfee Labs Threats Report: June 2018

This edition covers news and statistics gathered by McAfee Labs in the first quarter of 2018. Highlights include how attackers are employing new tactics, updates on the latest threat campaigns (Operation GhostSecret and Lazarus), a surge in coin miner malware, and a rise in multisector attacks.

McAfee Labs Threats Report: March 2018

This quarter McAfee Labs saw cybercriminals pivot from some of their tried-and-true methods, such as ransomware, toward newer tools and techniques, such as PowerShell malware and cryptocurrency mining.

McAfee Labs Threats Report: June 2017

McAfee Labs researchers examine the most powerful malware evasion techniques past, present, and future; the use of digital steganography in malware; and Fareit, the most famous password stealer.

Verizon 2017 Data Breach Investigations Report

McAfee co-authored a section on ransomware, highlighting ransomware technical advancements in 2016 and ways in which the industry is fighting back.

McAfee Labs Threats Report: April 2017

McAfee Labs researchers discuss the background and drivers of threat intelligence sharing. We also examine Mirai, which is notable because it detects and infects poorly secured IoT devices, transforming them into bots to attack its targets.

Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity

In a new report commissioned by McAfee, “Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity,” the Center for Strategic and International Studies surveyed 800 cybersecurity professionals to reveal how a mismatch of incentives gives cybercriminals an advantage.

McAfee Labs 2017 Threats Predictions

Our researchers offer long-lens predictions about cloud and internet of things (IoT) threats, laws, and vendor responses. They also make specific predictions about threats activity in 2017, including ransomware, vulnerabilities of all kinds, and the use of threat intelligence to improve defenses.

Health Warning: Cyberattacks are Targeting the Health Care Industry

Our researchers investigate the theft of and marketplace for stolen personal health information and biopharmaceutical intellectual property.

McAfee Labs Threats Report: September 2016

McAfee Labs researchers analyze survey data to gain a deeper understanding of data theft, investigate Q1/Q2 ransomware attacks on hospitals, and discuss the practical application of machine learning in cybersecurity.

Threat Intelligence Sharing

Learn more about threat intelligence sharing and McAfee’s leadership in driving its development.

The Need for Automotive Security

Successful attacks on automotive computer systems are becoming a reality, highlighting the increased threats to next-generation cars and motor vehicles. Get recommendations and best practices for securing the next-era vehicle.

Hacking the Skills Shortage

This report examines multiple aspects of the international shortage in cybersecurity skills and provides recommendations for addressing the workforce deficit.

McAfee Labs Threats Report: June 2016

McAfee Labs researchers investigate mobile app collusion, explain the current state of cryptographic algorithms, and provide an in-depth look at the Pinkslipbot Trojan.

Ransomware

Learn more about the growth of ransomware, how ransomware works, and how to protect against these attacks.

McAfee Labs Threats Report: March 2016

McAfee Labs researchers present results from primary market research around cyberthreat intelligence sharing and examine Adwind, a form of Java-based malware, which has grown in prevalence over the past year.

McAfee Labs 2016 Threats Predictions

This report includes two distinct views of the future: First, we look forward five years and predict how the cyber threat landscape will change and the security industry’s likely response. Then, we look tactically at 2016 and make specific predictions about expected threat activity.

The Hidden Data Economy

This report details a few of the many ways in which cyber thieves monetize the information they have stolen.

Malicious Signed Binaries Crush Certificate Authority Reputation

A drastic increase of malicious signed binaries has led to a lack of faith in the long-trusted certificate authority (CA) protocol.

Cybercriminals Thrive Via Virtual Currencies

The rise and popularity of virtual currencies has also given way to an increase of cybercrime on underground websites.

Three Mobile Threats Impacting Android Smartphones and Tablets

Malware shopping spree apps, NFC worms, and update-blocking malware will have a major impact on Android smartphones and tablets, and the overall mobile security landscape, in 2013.

What is Stuxnet?

In 2010 Stuxnet, a worm designed to sabotage energy facilities, attacked Iran’s nuclear enrichment facility. Since then, variants of the malware have proliferated with significant implications to the energy infrastructure around the globe.

How Cybercriminals Target Social Media Accounts

Cybercriminals are targeting social media users’ accounts now more than ever.

How to Fight Spam Text Messages (SMS Spam)

You can fight mobile phone spam, also known as SMS spam, by reporting spam messages to your cell phone carrier, registering your cell phone number with the National Do Not Call Registry, and checking your phone bill for unwanted spam text messages.

How Ransomware Infects Computers

Ransomware is one of the fastest growing areas of cybercrime. It uses links in emails or social media websites, and pay-per-install and drive-by downloads methods to infect computers.