Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee News

McAfee’s New Privacy & Identity Guard Launches at Staples Stores

Your privacy means everything. And your identity too. The launch of McAfee Privacy & Identity Guard will protect them both. ...

Internet Security

USB Drives – Protecting Your Humble Workhorse from Malware and Loss

The humble USB drive—the workhorse of students, professionals, and everyday computer users. No wonder hackers put USB drives in their...

Internet Security Mobile Security

Secret Selfies: Can Phones Take Pictures and Videos of You Without Your Knowledge?

It’s a longstanding question: can your phone really take selfies without your knowledge?  The answer is yes, but with a...

Internet Security

Online Job Scams – TikTokers Tell Their Stories, with a Warning

We reported earlier this year, a fresh rash of online job scams continue to rope in plenty of victims. Now,...

McAfee Labs

Peeling Back the Layers of RemcosRat Malware

Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email....

Internet Security

On Public Wi-Fi, a VPN is Your Friend

You can almost feel it in the air. Wi-Fi is everywhere. And if you tap into public Wi-Fi, do it...

Internet Security

A Traveler’s Guide to International Cybersecurity

Have you ever lost your suitcase on vacation? You arrive at baggage claim, keeping your eyes peeled for your belongings....

McAfee Labs

Crypto Scam: SpaceX Tokens for Sale

Authored by: Neil Tyagi   Scam artists know no bounds—and that also applies to stealing your cryptocurrency. Crypto scams are like...

Internet Security How To Guides and Tutorials

How to Protect Your LinkedIn Account

If you’re a LinkedIn user, log in now and strengthen your security. Reports indicate that LinkedIn accounts are under attack....

Internet Security

Be on the Lookout for Scam Tech Support Calls

Instead of getting you out of a jam, tech support scams get you into one. And they can get costly....

Internet Security

5 Online Gaming Tips to Stay Safe From Cybercriminals

Vanquishing aliens, building virtual amusement parks, mashing buttons in online battles royale. For some, playing video games is a way...

McAfee Labs

Invisible Adware: Unveiling Ad Fraud Targeting Android Users

Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and it’s no surprise...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Social Media Passwords from Hacks and Attacks

What does a hacker want with your social media account? Plenty.  Hackers hijack social media accounts for several reasons. They’ll...

McAfee Labs

The Season of Back to School Scams

Authored by: Lakshya Mathur and Yashvi Shah  As the Back-to-School season approaches, scammers are taking advantage of the opportunity to...

Internet Security

The Wild West of AI: Do Any AI Laws Exist?

Are we in the Wild West? Scrolling through your social media feed and breaking news sites, all the mentions of...

Internet Security

World Wide Web Day: How to Protect Your Family Online

The first of August marks the celebration of World Wide Web Day – a day dedicated to the global network...

Internet Security

AI in the Wild: Malicious Applications of Mainstream AI Tools

It’s not all funny limericks, bizarre portraits, and hilarious viral skits. ChatGPT, Bard, DALL-E, Craiyon, Voice.ai, and a whole host...

Privacy & Identity Protection

What is Spyware?

Spyware. If the name sounds creepy and invasive, that’s because it is.  The thought of someone virtually looking over your...

McAfee Labs

Scammers Follow the Rebranding of Twitter to X, to Distribute Malware

Authored by: Vallabh Chole and Yerko Grbic On July 23rd, 2023, Elon Musk announced that the social networking site, Twitter...

Privacy & Identity Protection

Four Ways To Use AI Responsibly

Are you skeptical about mainstream artificial intelligence? Or are you all in on AI and use it all day, every...

McAfee Labs

Android SpyNote attacks electric and water public utility users in Japan

Authored by Yukihiro Okutomi  McAfee’s Mobile team observed a smishing campaign against Japanese Android users posing as a power and...

Internet Security

Scammers Love Barbie: Fake Videos Promote Bogus Ticket Offers That Steal Personal Info

Turns out, scammers really love Barbie.  As Barbie makes her debut on the big screen, scammers are aiming to cash...

How To Guides and Tutorials

How to Protect Yourself From Tailgating Attacks

Holding the door for someone might open the way to a cyberattack. For anyone who works in a secure building...

Mobile Security

Mobile Spyware: How Hackers Can Turn Your Phone Into a Stalking Machine

Some crooks and shady characters will invade your privacy simply by asking for your permission to snoop—through invasive apps you...

Mobile Security

iPhone Update — Apply It Now If You Haven’t Already

Apple recently issued an urgent iPhone update, iOS version 16.5.1. If you haven’t updated yet, you should.  Owners of iPads...

Internet Security

Be Mindful of These 3 AI Tricks on World Social Media Day

Happy World Social Media Day! Today’s a day about celebrating the life-long friendships you’ve made thanks to social media. Social...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect School Children From Deep Fakes

Deep fakes are a growing concern in the age of digital media and can be extremely dangerous for school children....

Subscribe to McAfee Securing Tomorrow Blogs

Back to top