Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee Labs

Trailing the Trojan njRAT

One Trojan that just won’t go away is the remote access tool njRAT. Microsoft recently took down a leading domain...

Mobile Security

Chinese Worm Infects Thousands of Android Phones

Last weekend, it was reported in China that an SMS worm was wildly spreading among Android mobile phones, with more...

McAfee Labs

Android App SandroRAT Targets Polish Banking Users via Phishing Email

Europe is currently under attack by spammers trying to get control of Android devices. In Germany the distribution method is...

McAfee Labs

‘DHL’ SMS Spam Distributes Android Malware in Germany

One of the most common methods for distributing PC malware is the use of email spam messages that pose as...

How To Guides and Tutorials Family Safety

The Golden Rule Of The Internet- Tips To Help You Train Your Kids To Become Good Netizens

There are rules and then there are rules for kids. A set of rules for school, another defined set at...

McAfee Labs

Malicious Utility Can Defeat Windows PatchGuard

In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at...

Family Safety

Are Your Kids Using Decoy Apps to Hide Photos, Videos?

Wouldn’t it be convenient if the dangers heading toward our kids had neon signs pointing to them? Unfortunately, that’s not the...

Internet Security Security News Privacy & Identity Protection

Dropping Files Into Temp Folder Raises Security Concerns

Recently, the McAfee Advanced Exploit Detection System (AEDS) has delivered some interesting RTF files to our table. These RTFs have...

Mobile Security

More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked

In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else. Everyone else is...

Executive Perspectives

Results- vs. Device-Centric Threats: Why Cyber-Attacks Should be in the WMD Conversation

This week we’re heading to Colorado for the Aspen Institute’s annual Aspen Security Forum. I’ll be speaking on a Friday...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top