Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

How To Guides and Tutorials Mobile Security Privacy & Identity Protection

How to Stop Phone Spoofing

From impersonating police officers in Pennsylvania to employees of the City of San Antonio, scammers have been impersonating officials nationwide...

Internet Security

Top Tips for Cybersecurity Awareness Month

Imagine this: you wake up one morning to find that your bank account has been emptied overnight. Someone halfway across...

How To Guides and Tutorials

What Personal Data Do Companies Track?

Private tech companies gather tremendous amounts of user data. Understand what information is being collected by tech companies, how it’s being used, and how you can protect your privacy online.

Internet Security Mobile Security

My Instagram Has Been Hacked – What Do I Do Now?

In my world of middle-aged mums (mams), Instagram is by far the most popular social media platform. While many of...

How To Guides and Tutorials Privacy & Identity Protection

What Are the 6 Types of Identity Theft

You crack open your credit card statement and something seems … off. Maybe it’s a couple of small online purchases...

Internet Security

Clickbait and Switch: How AI Makes Disinformation Go Viral

Bad news travels quickly. Or so goes the old saying. Yet we do know this: disinformation and fake news spread...

Internet Security

Scarlett Johansson Tops McAfee’s 2024 Celebrity Hacker Hotlist for AI Online Scams

In today’s digital world, the line between reality and deception has become increasingly blurred, with cybercriminals leveraging cutting-edge AI technologies...

Internet Security

Beware of These Voting Scams Happening Now

With the election quickly approaching, it’s essential to be informed and cautious about the growing number of voting scams. Scammers...

Internet Security

How to Avoid Scams in the Wake of Hurricane Helene and Milton

In the aftermath of a major disaster like Hurricane Helene and Milton, people come together to rebuild and recover. Unfortunately,...

Internet Security

How Typosquatting Scams Work

Typosquatting is when someone registers a web address that’s a misspelling of a known website — usually a popular one....

Internet Security

Hallucinating Headlines: The AI-Powered Rise of Fake News

The number of AI-powered fake news sites has now surpassed the number of real local newspaper sites in the U.S....

How To Guides and Tutorials Family Safety

How to Reset Your Gmail Password After Being Hacked

If you think your Gmail account’s been hacked, you’ll want to act. And act quickly. The fact is that your...

Internet Security Family Safety

What is Malware?

What is malware? A dictionary-like definition is “malicious software that attacks computers, smartphones, and other connected devices.” In fact, “malware”...

Mobile Security

Location, Location, Location: Three Reasons It Matters for Your Smartphone

With its built-in location services, your smartphone can point you to plenty of places. To the location of your vacation...

Internet Security

How to Avoid Oversharing on Social Media

What is oversharing on social media? And how do you avoid it? Oversharing on social media takes on a couple...

Internet Security How To Guides and Tutorials

How to Delete Your TikTok Account

Thinking about deleting your TikTok account? We can show you how. Before we get to that, you might be interested...

How To Guides and Tutorials

How to Delete Your Facebook Account

Thinking about deleting your Facebook account? We can show you how. Before we get to that, you might be interested...

How To Guides and Tutorials

How to Delete Your Instagram Account

Deleting vs. Deactivating: Key Differences When considering leaving Instagram, you have two main options: deactivating or deleting your account. Understanding...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top