Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Security News Privacy & Identity Protection

Why Is the Verizon Data Breach Investigations Report Important to Me?

This blog was written by Bruce Snell. Every year Verizon releases their Data Breach Investigations Report (DBIR), sharing a wealth...

Life at McAfee

Why I Bring My Authentic Self to Work at McAfee

By Kristol, Sales Account Manager and President, McAfee African Heritage Community If you talked to me when I first started...

Privacy & Identity Protection

Why Everyone Needs a VPN

You may hear corporate cybersecurity experts hail the benefits of a VPN, or a virtual private network, to keep company...

How To Guides and Tutorials

Why Does My Phone Get Hot?

Overheating is a common issue in mobile devices, but it often raises alarms among users. This concern is usually unnecessary, as there are several common and easily resolvable reasons why phones get hot. However, it is essential to cool down an excessively hot device promptly to prevent it from overheating ...

McAfee Labs

Why Does My Car Have Its Own Smartphone?

You would be surprised at the number of places you can find a GSM SIM card. Outside of your mobile phone,...

Privacy & Identity Protection

Why Do I Need a Password Manager?

In today’s digital age, we know the importance of online privacy and security. However, with an increasing number of websites requiring passwords, it becomes tough to remember them all. This is where a password manager comes into play.

Mobile Security

Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware

  As smartphones get more sophisticated, it’s easy to forget their humble origins. Through today’s mobile apps, we can manage...

How To Guides and Tutorials Internet Security

Why Coin Miners Go Bad & How to Protect Your Tech When They Do

Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and Monero to cash in on the recent gold rush. Bitcoin’s meteoric rise in value is...

Privacy & Identity Protection

Why Are Some Countries Banning TikTok?

Waiting in the checkout line. Waiting to fall asleep. Waiting for your boring work call to finally end.  When you...

McAfee Labs

Why Am I Getting All These Notifications on my Phone?

Learn more about the Chrome notifications on Android mobile devices such as phones and tablets, and how McAfee Mobile Security protects users from malicious sites leveraging these notifications.

Internet Security Privacy & Identity Protection

Who loves tax season besides accountants? Hackers

Who loves tax season besides accountants? Hackers  It’s tax time in the United States, and even if you’re pretty sure...

McAfee News

White House Announces Possible Rise in Cyberattacks—What You Can Do to Stay Safe

The White House recently reissued a warning to American businesses in response to the unprecedented economic sanctions the U.S. has...

McAfee Labs

Which Cybersecurity Data Should You Trust?

Limitations of security data We are constantly battered by cybersecurity data, reports, and marketing collateral—and we shouldn’t treat all of this...

Mobile Security

Where, oh Where, Does That QR Code Lead?

What is square, flat, and black and white all over? If you answered “a QR Code”, you’re correct. One of...

Family Safety

Where’s the Truth Online? How to Build Your Family’s Digital Discernment

Note: This is Part I of a series on equipping your family fight back against fake news online.  Fake news...

Internet Security Family Safety

When Voice Recognition Goes Wrong: YouTube Videos Can Say “Ok Google”

YouTube videos are like today’s candid camera: they can be fun, educational, and, sometimes, a window into someone else’s most...

McAfee Labs

When the Digital Impacts the Physical

Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices…until they...

McAfee Labs

When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign

Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets. The following...

Mobile Security Family Safety

When Does My Child Really Need A Phone?

Deciding when to give your child a phone is not an easy task. Should you wait until they start high...

Mobile Security Family Safety Privacy & Identity Protection

What’s Your Click IQ?

The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be to have your...

How To Guides and Tutorials

What’s the Meaning of VPN? VPN Defined

A virtual private network (VPN) is a tool that enables users to protect their privacy while using an internet connection....

Internet Security Privacy & Identity Protection

What’s the Deal with Mirai? A Rundown on one of the Biggest Botnets

Every once in a while, a type of malware become so effective and prevalent that it dominates headlines for weeks....

Mobile Security

What’s in Your IoT Cybersecurity Kit?

Did you know the average internet-enabled household contains more than ten connected devices? With IoT devices proliferating almost every aspect...

McAfee Labs

What’s in the Box? Part II: Hacking the iParcelBox

Package delivery is just one of those things we take for granted these days. This is especially true in the...

Family Safety

What’s a Parent to Do? Closing the Protection Gap between You and Your Children.

Hands down, children look to their parents to keep them safe online more than anyone else, which begs the question—what’s...

Mobile Security Internet Security

WhatsApp With That? Security Flaw in Mobile Messaging Apps

Mobile phone calls and text messages seem to be going the way of the dinosaurs. In their place, a plethora...

Mobile Security

WhatsApp with End-to-End Encryption?

Throughout the past year, many mobile messaging apps have come under fire for inherent security vulnerabilities. This month, WhatsApp (one...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top