Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security Privacy & Identity Protection

How Cybercriminals Are Shopping for Personal Data This Black Friday

While the majority of us look forward to Black Friday and Cyber Monday for the best deals, there’s another group...

Family Safety

Keeping Kids Safe from Online Threats

The majority of domestic tech devices, such as personal computers and smartphones, only have basic consumer antivirus software, if any at all. This puts children at significant risk of falling victim to cyber threats like malware and phishing attacks.

Internet Security Family Safety

What is Social Engineering?

In the realm of cybersecurity, there is one vulnerability that is often overlooked – the human element. While firewalls, encryption,...

Life at McAfee

McAfee Team Members Share Their Virtual Onboarding Experiences

At McAfee, ensuring our new team members are well prepared and supported for their roles is a top priority. From...

Family Safety

5 Fun Ways to Keep Family Connections Strong (and Secure) This Holiday 

5 Fun Ways to Keep Family Connections Strong (and Secure) This Holiday The reality is beginning to hit: The holiday...

Family Safety

AI & Your Family: The Wows and Potential Risks

From cell phones with built-in smart assistants to home assistants that carry out voice commands, from social networks that determine what content we see to music apps that curate playlists based on our preferences, AI has its footprints everywhere. Therefore, it’s integral to not only embrace the wows of this ...

Internet Security

The Smart Home Security Guide

The expansion of smart home devices in our households is remarkable, with nearly everything from our lights to our laundry...

Internet Security

Spot Those Black Friday and Cyber Monday Shopping Scams

We’re not the only ones looking forward to the big holiday sales like Black Friday and Cyber Monday. Hackers are too. As people flock to retailers big and small in search of the best deals online, hackers have their shopping scams ready.

How To Guides and Tutorials Internet Security

Christmas Shopping 2020

How To Stay Safe While Shopping Online This Holiday Season I’m pleased to report that I’ve achieved a number of...

How To Guides and Tutorials Internet Security

‘Sleigh’ Holiday Shopping by Protecting Your Online Security

‘Sleigh’ Holiday Shopping by Protecting Your Online Security And just like that, the holiday shopping season is among us! Like...

How To Guides and Tutorials Privacy & Identity Protection

How To Keep Your Data Private Online

Whether data gets collected for advertising purposes, or to generate profit by selling data to others, your privacy has a price tag on it. Yet you have some say in all this. You can take several steps that can minimize the data trail that you create by going online. Put ...

How To Guides and Tutorials

How to Prevent Keyboard Snooping Attacks on Video Calls

Video conferencing has really taken off this year. With more people working and learning from home than ever before, video...

Internet Security

Thankful for broadband internet, and hopeful for much more  

Thankful for broadband internet, and hopeful for much more    Where would we be without our internet this year?  We’ve shopped, worked, studied and taught, job hunted, and cared...

Mobile Security Family Safety

Understanding the Risks of Using an Android Device

Android has, over time, become a popular target for hackers. Recently, McAfee Labs™ found that all new forms of malicious mobile software were solely designed to exploit vulnerabilities in the Android operating system.

Family Safety

Understanding Online Trolls and How to Deal with Them

Imagine, if you will, a person who goes online each day with the sole mission of triggering confrontation, provoking conflict,...

McAfee Labs

CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server

CVSS Score: 9.8  Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C  Overview  Microsoft released a patch today for a critical vulnerability (CVE-2020-17051) in the Windows NFSv3 (Network File System) server. NFS is typically...

Life at McAfee

Honoring Our Brave Military Veterans from the McAfee Community

Paying Tribute November 11 marks Veterans Day and Remembrance Day. It is a time for us to come together and...

Family Safety

What You Need to Know About Among Us

Among Us – one of the Most Popular Online Game of 2020 If you have teens and you haven’t yet...

Family Safety

Pickpocketing – Digital Style

Gone are the days when thieves would physically steal your wallet. Instead, they are using sophisticated techniques to steal your personal information and drain your bank accounts without you even realizing it. This article aims to shed light on digital pickpocketing, its impacts on your digital assets, and measures to ...

Family Safety

Are You Forwarding Jokes Or Spam?

With the advent of messaging and social media applications, sharing jokes or memes has become increasingly frequent and convenient. While we often perceive this as harmless fun, it’s essential to address a question that we don’t ask ourselves often enough: Are we forwarding jokes or inadvertently distributing spam?

Family Safety

5 Ways to Safeguard Your Child’s Instagram Bio

Keeping your child safe online is a growing concern for many parents. However, there are ways you can help safeguard your child’s Instagram bio and enhance their online safety. Here are 5 tips to consider.

Internet Security Privacy & Identity Protection

How To Tell If Your Smart TV Spying on You

In a chilling echo of George Orwell’s dystopian novel 1984, it’s possible that Big Brother – or in this case,...

Family Safety

Helping Your Family Combat Digital Misinformation

Helping Your Family Combat Digital Misinformation If 2020 has taught us anything, it’s that our ability to think critically about...

How To Guides and Tutorials

Two-Factor vs. Multi-Factor Authentication: What’s the Difference?

This article breaks down the forms of authentication, explaining how they work and how they can enhance online information security.

Mobile Security Privacy & Identity Protection

Beware of Malicious Mobile Apps

With the surge in the usage of mobile phones, there has been a concurrent increase in malicious activities targeting these devices. One common technique used by hackers is to corrupt legitimate applications. Android devices, in particular, see increases in malware targeting mobile phones year by year.

Life at McAfee

One Team Member Selflessly Provides Relief to COVID-19’s Front Line

By: Heiko, Senior Security Engineer, Germany I never could have imagined that what started as a national duty to volunteer...

McAfee Labs

Operation North Star: Behind The Scenes

Executive Summary It is rare to be provided an inside view on how major cyber espionage campaigns are conducted within...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top