Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Family Safety Privacy & Identity Protection

Do You Share Passwords with Friends and Family?

A text pops up on your phone. It’s your pal, and the text says, “What’s the password again?” It might...

How To Guides and Tutorials Privacy & Identity Protection

How a VPN Can Make Your Time Online More Private and Secure

What is a VPN (virtual private network)? And how can it make your time online more secure—and a little more...

McAfee Labs

The Scam Strikes Back: Exploiting the CrowdStrike Outage

Authored by Lakshya Mathur, Vallabh Chole & Abhishek Karnik Recently we witnessed one of the most significant IT disruptions in...

How To Guides and Tutorials Mobile Security

Are Mobile Devices Less Secure than PCs?

Are smartphones less secure than PCs? The answer to that is, they’re different. They face different security threats. Yet they...

McAfee Labs

Olympics Has Fallen – A Misinformation Campaign Featuring a Voice Cloned Elon Musk

Authored by Lakshya Mathur and Abhishek Karnik As the world gears up for the 2024 Paris Olympics, excitement is building,...

How To Guides and Tutorials

Does Windows 10 or 11 Need Antivirus Software?

Does Windows 10 or 11 need antivirus software? Absolutely. Every computer needs protection against viruses and other malware. The next...

Internet Security How To Guides and Tutorials

What Does “Connection is Not Private” Mean?

Have you ever visited a site that triggers a “your connection is not private” or “your connection is not secure”...

Internet Security Privacy & Identity Protection

Does PC Cleaning Improve Performance?

Cleaning up your PC has several advantages, including the speeding up of your system and safeguarding your personal information from potential threats. Besides, the process frees up storage space.

Internet Security How To Guides and Tutorials

My email has been hacked! What should I do next?

If you find that your email has been hacked, your immediate reaction is probably wondering what you should next. The answer: take a deep...

Security News

CrowdStrike Outage Provides Opportunities for Scammers 

Recently, a significant global outage resulted in thousands of Windows computers being brought offline. The source of the outage was...

Privacy & Identity Protection

How to Identify the Different Forms of Identity Theft

Identity theft is a pervasive threat in today’s digital age, with various forms that can wreak havoc on individuals’ lives....

Internet Security

10 Artificial Intelligence Buzzwords You Should Know

Artificial intelligence used to be reserved for the population’s most brilliant scientists and isolated in the world’s top laboratories. Now,...

Internet Security How To Guides and Tutorials

How to Tell Whether a Website Is Safe or Unsafe

Something looks a little…sketchy. Is that website safe or unsafe?   Nowadays, it can take a bit of work to...

How To Guides and Tutorials Privacy & Identity Protection

How to Help Protect Your Online Privacy

When it comes to protecting your privacy, take a close look at your social media use—because sharing can quickly turn...

McAfee Labs

ClickFix Deception: A Social Engineering Tactic to Deploy Malware

Authored by Yashvi Shah and Vignesh Dhatchanamoorthy McAfee Labs has discovered a highly unusual method of malware delivery, referred to...

Mobile Security

How Does Jailbreaking Or Rooting Affect My Mobile Device Security?

In today’s interconnected world, our mobile devices serve as essential tools for communication, productivity, and entertainment. However, for some tech-savvy...

Privacy & Identity Protection

What Is Generative AI and How Does It Work?

It’s all anyone can talk about. In classrooms, boardrooms, on the nightly news, and around the dinner table, artificial intelligence...

Family Safety Privacy & Identity Protection

Everything You Need to Know to Keep Your Passwords Secure

How do you manage all those user names and passwords without having a cheat sheet in a file on your computer or stuck on post-it notes next to your computer? Neither option provides the security you should reserve for passwords.

Subscribe to McAfee Securing Tomorrow Blogs

Back to top