Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security

Safer Internet Day: Telling What’s Real from What’s Fake Online

On Safer Internet Day, we ask an important question: how can you tell what’s real and what’s fake online?   There’s...

How To Guides and Tutorials Mobile Security

How to Beat Robocallers at Their Game

Some scams make a telltale sound—rinnng, rinnng! Yup, the dreaded robocall. But you can beat them at their game.    Maybe it’s a call about renewing...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Fake Art and Deepfakes

Artificial intelligence (AI) is making its way from high-tech labs and Hollywood plots into the hands of the general population....

Internet Security

This Election Season, Be on the Lookout for AI-generated Fake News

It’s that time of year again: election season! You already know what to expect when you flip on the TV....

Internet Security

Was the Fake Joe Biden Robocall Created with AI? 

As voters in the recent New Hampshire primary have found, a fake robocall of President Joe Biden has been making...

Internet Security

Protect What Matters on Data Privacy Day

Imagine a “Privacy Facts” label on the apps, devices, and websites you use. Like a digital version of the “Nutrition...

Internet Security

26 Billion Records Released in “The mother of all breaches”

Security researchers have discovered a massive data breach containing more than 26 billion records — a hacker’s trove of records...

McAfee Labs

From Email to RAT: Deciphering a VB Script-Driven Campaign

Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized by obfuscated Visual...

Life at McAfee

Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community

Today, we celebrate the life and legacy of Dr. Martin Luther King Jr. Dr. King diligently dedicated his life to...

Internet Security

No, Taylor Swift Won’t Send You a Free Dutch Oven — The New AI Cloning Scam

Taylor Swift wants plenty of good things for her fans — but a free Dutch oven isn’t one of them.  ...

Internet Security

New Year, New Tech at CES — The Latest Protection for the Latest Tech

New year, new tech. That’s what hits the floor at the CES show each January in Las Vegas. Whether it’s...

Internet Security How To Guides and Tutorials

How to Stay Safe in the Age of AI

We’ve seen how AI can create — and how it can transform our lives. What gets talked about less is...

Internet Security

6 Cybersecurity Predictions for 2024 – Staying Ahead of the Latest Hacks and Attacks

AI and major elections, deepfakes and the Olympics — they all feature prominently in our cybersecurity predictions for 2024. That’s...

Mobile Security McAfee Labs

Stealth Backdoor “Android/Xamalicious” Actively Infecting Devices

Authored by Fernando Ruiz  McAfee Mobile Research Team identified an Android backdoor implemented with Xamarin, an open-source framework that allows...

How To Guides and Tutorials Mobile Security

How to Protect Yourself from QR Code Scams

Imagine paying $16,000 to park your car in a lot for a couple of hours. That’s what happened to one...

McAfee Labs

Shielding Against Android Phishing in Indian Banking

Authored by Neil Tyagi and Fernando Ruiz In a digitally evolving world, the convenience of banking through mobile applications has...

How To Guides and Tutorials Family Safety

How to Raise Responsible Digital Citizens

‘So, what is the ultimate goal of all of our parenting?’ When I asked this question to a group of...

Internet Security How To Guides and Tutorials

How to Protect Your Kids From Inappropriate Online Content

Inquisitive, curious and fiercely independent. These are the three words that come to mind when I remember my boys as...

Internet Security

Deepfake Defense: Your 8-Step Shield Against Digital Deceit

A disturbing story out of western Spain spotlights challenges of technological evolution. Unwitting children and teenagers were victims of users...

Internet Security

Safer AI: Four Questions Shaping Our Digital Future

Depending on the day’s most popular headlines, AI is either a panacea or the ultimate harbinger of doom. We could...

Internet Security How To Guides and Tutorials

What Is Credential Phishing?

You guard the keys to your home closely, right? They have their own special spot in your bag or in...

Security News

User Data from 23andMe Leaked Online – What Users Should Do, and the Rest of Us Too

In October, a hacker claimed to have hijacked profile information of “millions” of users from the popular genetic testing site...

Internet Security Mobile Security

Do I Really Need to be on Snapchat to be a Good Digital Parent?

If you had to count the number of social media platforms your teen uses, I wonder what the score would...

Internet Security Mobile Security

Is That Delivery Text Real or Fake? How to Shop and Ship Safely this Season

With the rush of Black Friday and Cyber Monday shopping comes a rush of another kind. Millions of fake delivery...

McAfee Labs

PDF Phishing: Beyond the Bait

By Lakshya Mathur & Yashvi Shah  Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential...

Internet Security How To Guides and Tutorials

How to Help Your Teens Stay Safe When They Start Dating Online

In the 80’s, train stations and church groups were the key places to meet boys. And despite the fact I...

Internet Security How To Guides and Tutorials

How to Shop Safely This Holiday Season

Yes, there is a Cyber Grinch. In fact, you’ll find evidence of an entire host of grinches online — the...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top