Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security

What to Do if Your Phone is Stolen or Lost: 10 Steps to Protect Your Identity

Losing your phone or having it stolen can feel like a nightmare, especially when you consider the treasure trove of...

How To Guides and Tutorials Internet Security

What to Do If Your Email Is Hacked

Email hacking is more common than you think. If you find yourself a victim of email hacking here are a few important steps you need to take.

Family Safety

Protect the Whole Family with McAfee+ Ultimate Family Plan

Many content creators highlight the differences between today’s most prominent generations: the Silent Generation, baby boomers, Generation X, millennials, and...

Internet Security

How a Tech Expert Lost $13,000 to a Job Scam

Sam M. has spent more than 20 years building websites, testing systems, and managing technology projects. He knows code, he...

Internet Security

From Cyberbullying to AI-Generated Content – McAfee’s Research Reveals the Shocking Risks

The landscape of online threats targeting children has evolved into a complex web of dangers that extend far beyond simple...

Internet Security

Scam Alert: The Alarming Reality Behind the Surge in Digital Fraud

Scams exploded in 2025 and shows no signs of slowing in 2026. Job, shopping, finance, & tech fraud is up. Explore trends and tips to protect yourself online.

How To Guides and Tutorials Internet Security

How to Delete Your Browser History

Learn how to delete your browsing history across popular browsers and accounts to enhance privacy, improve device performance, and reduce targeted tracking.

McAfee News

McAfee Again Certified as “TOP PRODUCT” by AV-TEST

McAfee Total Protection has once again been named a TOP PRODUCT by the independent test lab AV-TEST, earning perfect scores...

How To Guides and Tutorials Privacy & Identity Protection

How to Remove Your Personal Information From the Internet

Scammers and thieves can get a hold of personal information in several ways, such as through phishing attacks that lure you into handing it over, malware that steals it from your devices, by purchasing your information on dark web marketplaces, or as a result of information leaked in data breaches, ...

Internet Security McAfee Labs

Astaroth: Banking Trojan Abusing GitHub for Resilience

by Harshil Patel and Prabudh Chakravorty *EDITOR’S NOTE: Special thank you to the GitHub team for working with us on...

How To Guides and Tutorials

Best Ways to Check for a Trojan on Your PC

In this guide, we will take a closer look at how you can detect Trojans on your computer, and share ways to detect and remove them.

McAfee News

McAfee Wins “Best Use of AI in Cybersecurity” for Scam Detector

We’re proud to share that McAfee has won “Best Use of AI in Cybersecurity” at The 2025 A.I. Awards for...

Security News Internet Security

Hackers Trick Staff Into Exposing Major Companies’ Salesforce Data–Find Out if You’re Safe

Cybercriminals tricked employees at major global companies into handing over Salesforce access and used that access to steal millions of...

Security News Internet Security

AWS Outage Disrupts Major Apps Like Reddit and Snapchat—What Happened and How to Stay Safe

Amazon Web Services (AWS), one of the world’s largest cloud providers, recently experienced a major outage that disrupted popular websites...

Internet Security

This New “Verification” Trick Fools You Into Installing Malware

Cybercriminals are turning to TikTok to spread new scams that promise “free upgrades” or access to premium versions of popular...

Internet Security

Ghost Accounts: How Old, Forgotten Logins Put You at Risk for Identity Theft

Remember that website where you bought a T-shirt in 2013? No? Hackers do. And it’s one way they can steal...

Internet Security Mobile Security

Vampire Wifi: How Public Wi-Fi Traps Travelers in Cyber Attacks

They’re not hiding in dark alleys—they’re hiding in plain sight. Airports, cafés, hotels, even libraries can harbor dangerous Vampire Wi-Fi...

Internet Security

Frankenstein Data: How Data Brokers Stitch Together—and Sell—Your Digital Self

Your digital life is being stitched together—one purchase, one search, one swipe at a time. Data brokers collect and combine...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top