Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security Mobile Security

My Instagram Has Been Hacked – What Do I Do Now?

In my world of middle-aged mums (mams), Instagram is by far the most popular social media platform. While many of...

How To Guides and Tutorials Privacy & Identity Protection

What Are the 6 Types of Identity Theft

You crack open your credit card statement and something seems … off. Maybe it’s a couple of small online purchases...

Internet Security

Clickbait and Switch: How AI Makes Disinformation Go Viral

Bad news travels quickly. Or so goes the old saying. Yet we do know this: disinformation and fake news spread...

Internet Security

Scarlett Johansson Tops McAfee’s 2024 Celebrity Hacker Hotlist for AI Online Scams

In today’s digital world, the line between reality and deception has become increasingly blurred, with cybercriminals leveraging cutting-edge AI technologies...

Internet Security

Beware of These Voting Scams Happening Now

With the election quickly approaching, it’s essential to be informed and cautious about the growing number of voting scams. Scammers...

Internet Security

How to Avoid Scams in the Wake of Hurricane Helene and Milton

In the aftermath of a major disaster like Hurricane Helene and Milton, people come together to rebuild and recover. Unfortunately,...

Internet Security

How Typosquatting Scams Work

Typosquatting is when someone registers a web address that’s a misspelling of a known website — usually a popular one....

Internet Security

Hallucinating Headlines: The AI-Powered Rise of Fake News

The number of AI-powered fake news sites has now surpassed the number of real local newspaper sites in the U.S....

Mobile Security

Location, Location, Location: Three Reasons It Matters for Your Smartphone

With its built-in location services, your smartphone can point you to plenty of places. To the location of your vacation...

Internet Security

How to Avoid Oversharing on Social Media

What is oversharing on social media? And how do you avoid it? Oversharing on social media takes on a couple...

Internet Security How To Guides and Tutorials

How to Delete Your TikTok Account

Thinking about deleting your TikTok account? We can show you how. Before we get to that, you might be interested...

How To Guides and Tutorials

How to Delete Your Facebook Account

Thinking about deleting your Facebook account? We can show you how. Before we get to that, you might be interested...

How To Guides and Tutorials

How to Delete Your Instagram Account

Thinking about deleting your Instagram account? We can show you how. Before we get to that, you might be interested...

How To Guides and Tutorials

How to Spot a Deepfake on Social Media

Think you can spot a fake on social media? It’s getting tougher. Particularly as deepfake technology gets far better and...

Internet Security

How To Survive the Deepfake Election with McAfee’s 2024 Election AI Toolkit

As malicious deepfakes continue to flood our screens with disinformation during this election year, we’ve released our 2024 Election AI...

How To Guides and Tutorials Family Safety

How AI PCs Are Optimizing Productivity Tools for Students

In today’s fast-paced educational environment, productivity is a key determinant of academic success. Enter AI PCs—computers enhanced with artificial intelligence...

Internet Security

Gift Card Scams — The Gift That Keeps on Taking

Gift card scams are an easy payday for scammers—and a costly mistake for victims. They work because gift cards are...

Internet Security

How To Protect Yourself from Black Friday and Cyber Monday AI Scams 

As Black Friday approaches, eager bargain hunters are gearing up to snag the best deals online. But with the excitement...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Digital Identity

People under 60 are losing it online. And by it, I mean money—thanks to digital identity theft.  In its simplest form,...

Mobile Security

Every Step You Take, Every Call You Make: Is Your Phone Tracking You?

So, what does your phone know about you? Taken all together it knows plenty — sometimes in ways that feel...

Internet Security

Safeguarding Those Who Served: Cybersecurity Challenges for Veterans

As we honor Veterans Day, it’s crucial to recognize not only the sacrifices made by those who served but also...

Internet Security Privacy & Identity Protection

What Is a Botnet?

What is a botnet? And what does it have to do with a toaster? We’ll get to that. First, a...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Protect Yourself from Bank Fraud

More and more transactions occur over the internet rather than at a teller’s window, and nearly every account has a username, password, and PIN associated with it. Whether you use online banking regularly or sparingly, you can protect yourself from being the victim of fraud by following a few straightforward ...

Privacy & Identity Protection

What is the Dark Web?

The dark web. The name raises all kinds of questions. What is the dark web, really? Where is it? Can...

How To Guides and Tutorials

How AI Deepfakes and Scams Are Changing the Way We Shop Online

As 89% of Americans plan to shop online during this holiday shopping season, many say they’re more concerned about being...

Internet Security How To Guides and Tutorials

How to Secure Your Digital Wallet

Tapping your phone at the cash register makes for a smooth trip to the store. Far smoother than fumbling for...

Family Safety

How to Be Your Family’s Digital IT Hero for the Holidays

The holiday season often brings a rush of new gadgets—smartphones, tablets, laptops, and smart home devices—into households. One survey revealed...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top