Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security

What Is Synthetic Identity Theft?

It’s too bad cybercriminals don’t funnel their creativity into productive pursuits because they’re constantly coming up with nefarious new ways...

Privacy & Identity Protection

What is Spyware?

Spyware. If the name sounds creepy and invasive, that’s because it is.  The thought of someone virtually looking over your...

Internet Security Privacy & Identity Protection

What is Spam?

Everyone’s heard of spam as it pertains to emails. Spam isn’t necessarily a malicious message designed to trick you into...

Internet Security

What is Sora and What Does It Mean for Your Personal Internet Security?

Imagine a tool that can transform text into captivating videos, bridging the gap between imagination and reality by creating videos...

Internet Security Family Safety

What is Social Engineering?

In the realm of cybersecurity, there is one vulnerability that is often overlooked – the human element. While firewalls, encryption,...

Mobile Security

What Is Smishing? Here’s How to Spot Fake Texts and Keep Your Info Safe

Your phone buzzes. You hope it’s a reply from last night’s date, but instead you get an entirely different swooping...

Internet Security

What Is Smishing and Vishing, and How Do You Protect Yourself?

Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text...

Internet Security

What Is Smishing and Vishing, and How Do You Protect Yourself

Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text...

Internet Security Privacy & Identity Protection

What is Shoulder Surfing?

The next time you’re in a public place and glued to your smartphone or tablet — whether it’s at the...

Internet Security Privacy & Identity Protection

What Is Script-Based Malware? How to Stay Protected from This Cyberthreat

When you hear the word “script,” you probably think of either a movie script, or JavaScript. Though most of us...

Internet Security Family Safety

What is Scareware?

When it comes to making us fall for their scams, cybercriminals have a number of tricks up their sleeves. One...

Family Safety

What is Roblox and is It Safe for Kids?

If you have a tween or teen, you’ve likely heard a lot of excited chatter about Roblox. With a reported 150 million users, there’s a good chance your child has the Roblox site on their phone, tablet, PC, or Xbox.  However, as with all digital destinations, the fun of Roblox ...

Internet Security Mobile Security

What is Ransomware?

Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly...

Internet Security Privacy & Identity Protection

What Is Ransomware and Who Does It Target?

Lockouts—they happen. We forget our keys, we can’t remember our passwords—and sometimes, someone else locks us out. And in the...

How To Guides and Tutorials Internet Security Mobile Security

What Is Quishing? How QR Code Scams Work and How to Avoid Them

You thought you were scanning a menu.  Or paying for parking. Or checking a package notice taped to your door....

Internet Security Privacy & Identity Protection

What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation

Gary Davis is now a regular contributor on the Tech Nation podcast!  In this episode, Gary Davis educates that phishing...

How To Guides and Tutorials

What Is Phishing?

So much of our personal and professional lives are online — from online banking to connecting with friends and family...

Internet Security Privacy & Identity Protection

What is Pharming?

. For a lot of kids today, mash-ups are all the rage—whether it’s combining two videos, two songs, or two...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top