Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security

What is Artificial Intelligence?

At the beginning of the year, the Associated Press described artificial intelligence (AI) as “easily the biggest buzzword for world...

Internet Security

What is Antivirus and What Does It Really Protect?

Authored by Dennis Pang What is antivirus? That’s a good question. What does it really protect? That’s an even better...

Internet Security

What is an AI PC?

As technology rapidly advances, the boundaries of what’s possible in personal computing are continuously expanding. One of the most exciting...

How To Guides and Tutorials

What Is Adware? A Definitive Guide

We live in a digital world and a lot of our daily activities are online, including banking, grocery shopping, and...

Internet Security

What is a Zero-Day Threat?

“Zero-day threat.” It may sound like the title of a hit film, yet it’s anything but.   It’s a previously unknown...

Internet Security Privacy & Identity Protection

What is a VPN and Can it Hide My IP Address?

There’s a lot of misinformation about Virtual Private Networks, what they do, and the security benefits they offer. For this article, I’d like to do...

Internet Security Privacy & Identity Protection

What is a Virus?

Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses,...

How To Guides and Tutorials

What Is a Trojan?

You may vaguely remember reading Virgil’s epic poem “Aeneid” back when you were in school. The story of Odysseus and...

Internet Security Privacy & Identity Protection Family Safety

What Is a Trojan Horse?

One of history’s great literary classics is Homer’s Iliad, which tells the story of the Trojan horse—the wooden horse that...

Internet Security Privacy & Identity Protection

What is a Rootkit?

A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit...

Internet Security Privacy & Identity Protection

What is a Remote Administration Tool (RAT)?

Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I...

Internet Security Privacy & Identity Protection

What is a Potentially Unwanted Program (PUP)?

Whether you’re an animal person or not, you have to admit that puppies are pretty darn cute. So cute that...

How To Guides and Tutorials

What Is a Password Manager?

Many of us rely on passwords to secure our digital devices and online accounts, from our personal computers and mobile...

Life at McAfee

What is a McAfee Internship Like? 10 Interns Share Perspectives

At McAfee, we foster meaningful internship experiences within our fast-paced world of cybersecurity.  We know it’s the next generation that will build tomorrow’s technology solutions. McAfee interns make substantial contributions and are valued as global team members, joining our...

Internet Security Family Safety

What is a Man-in-the-Middle Attack?

There’s a reason why most people feel uncomfortable about the idea of someone eavesdropping on them—the eavesdropper could possibly overhear...

Internet Security Family Safety

What is a Keylogger?

Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every...

Internet Security Privacy & Identity Protection

What is a Hacker?

You probably think you know what a “hacker” is, but the images portrayed in the media can be misleading. You...

Internet Security Family Safety

What is a Firewall?

Most of us may have heard the term, and know it’s related to security in some way, but do you...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top