Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Family Safety

How Teens Date in the Digital Age

Falling in love in the internet age is a whole different ball game to the social-media-free ’70s, ’80s and ’90s....

Internet Security

How Online Dating Scams work and How to Spot Them

Sarah didn’t see it coming. A single mom in her late 40s, “Sarah” was especially lonely after her divorce (name...

Mobile Security

Thelma – The Real-Life Voice Scam That Made It into the Movies

This has to be a first. Something from our blogs got made into a movie. We’re talking about voice scams,...

How To Guides and Tutorials

How to Safely Connect to Public Wi-Fi While Traveling

As the summer sun beckons us to explore new destinations, many of us rely on public Wi-Fi to stay connected...

Security News

The Kaspersky Software Ban—What You Need to Know to Stay Safe Online

Citing national security concerns, the U.S. Department of Commerce has issued a ban on the sale of all Kaspersky online...

How To Guides and Tutorials Mobile Security

How to Protect Yourself from Vishing

“Vishing” occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers...

Family Safety

What Security Means to Families

What is our real job as parents? Is it to ensure our kids get good grades? – Maybe. Or is...

McAfee Labs

Quality Over Quantity: the Counter-Intuitive GenAI Key

It’s been almost two years since OpenAI launched ChatGPT, driving increased mainstream awareness of and access to Generative AI tools....

Internet Security

The Top 10 Online Booking Scam Hotspots in the U.S. Revealed

With a record-breaking number of Americans set to travel over the July 4th holiday, most of them by car, scammers...

McAfee News

Get Yourself AI-powered Scam Text Protection That Spots and Block Scams in Real Time

The tables have turned. Now you can use AI to spot and block scam texts before they do you harm. ...

Internet Security How To Guides and Tutorials

How to Protect Yourself on Social Networks

There are now over 5 billion active social media users worldwide, representing 62.3% of the global population. While social networks...

How To Guides and Tutorials

What is Doxing?

Imagine someone putting your personal information out online for thousands of strangers to see—your home address, phone number, even details...

How To Guides and Tutorials

How to Safeguard Your Digital Assets While Backpacking on a Budget

Traveling on a budget while backpacking allows individuals to immerse themselves fully in local cultures, explore off-the-beaten-path destinations, and forge...

Internet Security

RockYou2024: Unpacking the Largest Password Leak in History

This Fourth of July brought fireworks in the form of a digital security breach, one that has been recorded as...

Family Safety Privacy & Identity Protection

Everything You Need to Know to Keep Your Passwords Secure

How do you manage all those user names and passwords without having a cheat sheet in a file on your computer or stuck on post-it notes next to your computer? Neither option provides the security you should reserve for passwords.

Privacy & Identity Protection

What Is Generative AI and How Does It Work?

It’s all anyone can talk about. In classrooms, boardrooms, on the nightly news, and around the dinner table, artificial intelligence...

McAfee Labs

ClickFix Deception: A Social Engineering Tactic to Deploy Malware

Authored by Yashvi Shah and Vignesh Dhatchanamoorthy McAfee Labs has discovered a highly unusual method of malware delivery, referred to...

Security News

UPDATED: AT&T Data Leak: What You Need to Know and How to Protect Yourself

Update: AT&T announced a cybersecurity breach on July 12th that exposed call records and text data for a significant portion...

How To Guides and Tutorials Privacy & Identity Protection

How to Help Protect Your Online Privacy

When it comes to protecting your privacy, take a close look at your social media use—because sharing can quickly turn...

How To Guides and Tutorials Family Safety

How To Protect Your Family’s Smartphones While on Vacation

Summer is synonymous with vacations, a time when families pack their bags, grab their sunscreen, and embark on exciting adventures....

Internet Security How To Guides and Tutorials

How to Tell Whether a Website Is Safe or Unsafe

Something looks a little…sketchy. Is that website safe or unsafe?   Nowadays, it can take a bit of work to...

Internet Security

10 Artificial Intelligence Buzzwords You Should Know

Artificial intelligence used to be reserved for the population’s most brilliant scientists and isolated in the world’s top laboratories. Now,...

Privacy & Identity Protection

How to Identify the Different Forms of Identity Theft

Identity theft is a pervasive threat in today’s digital age, with various forms that can wreak havoc on individuals’ lives....

Security News

CrowdStrike Outage Provides Opportunities for Scammers 

Recently, a significant global outage resulted in thousands of Windows computers being brought offline. The source of the outage was...

Internet Security How To Guides and Tutorials

My email has been hacked! What should I do next?

If you find that your email has been hacked, your immediate reaction is probably wondering what you should next. The answer: take a deep...

Internet Security Privacy & Identity Protection

Does PC Cleaning Improve Performance?

Cleaning up your PC has several advantages, including the speeding up of your system and safeguarding your personal information from potential threats. Besides, the process frees up storage space.

Internet Security How To Guides and Tutorials

What Does “Connection is Not Private” Mean?

Have you ever visited a site that triggers a “your connection is not private” or “your connection is not secure”...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top