Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Privacy & Identity Protection

Watch Out for These 3 World Cup Scams

What color jersey will you be sporting this November and December? The World Cup is on its way to television...

Privacy & Identity Protection

Privacy, Identity, and Device Protection: Why You Need to Invest in All Three

Protecting your devices with antivirus is a great start, yet it’s only one part of staying safer online. With the...

Privacy & Identity Protection

Why Everyone Needs a VPN

You may hear corporate cybersecurity experts hail the benefits of a VPN, or a virtual private network, to keep company...

Internet Security How To Guides and Tutorials

What Is Internet Security?

Internet security is a broad term that refers to a wide range of tactics that aim to protect activities conducted...

McAfee Labs

Threat Actors Taking Advantage of FTX Bankruptcy 

Authored by Oliver Devane  It hasn’t taken malicious actors long to take advantage of the recent bankruptcy filing of FTX,...

McAfee Labs

Microsoft’s Edge over Popups (and Google Chrome)

Following up on our previous blog, How to Stop the Popups, McAfee Labs saw a sharp decrease in the number...

Security News

The Medibank Data Breach – Steps You Can Take to Protect Yourself

Hackers have posted another batch of stolen health records on the dark web—following a breach that could potentially affect nearly...

Internet Security How To Guides and Tutorials

What Is Bloatware and How Can It Impact Security?

The joy of purchasing a new device is liberating. Now you can work, learn, and play faster — along with...

How To Guides and Tutorials Privacy & Identity Protection

How to Remove Your Personal Information From the Internet

Scammers and thieves can get a hold of personal information in several ways, such as through phishing attacks that lure you into handing it over, malware that steals it from your devices, by purchasing your information on dark web marketplaces, or as a result of information leaked in data breaches, ...

Internet Security

What Is Smishing and Vishing, and How Do You Protect Yourself?

Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text...

McAfee Labs

Don’t Get Caught Offsides with These World Cup Scams

Authored by: Christy Crimmins and Oliver Devane Football (or Soccer as we call it in the U.S.) is the most...

Family Safety

How Cyberbullying Looks In Australia in 2023

There’s no doubt that cyber bullying ranks towards the top of most parents ‘worry list’. As a mum of 4,...

How To Guides and Tutorials Mobile Security

A Guide to Remove Malware From Your iPhone

Malicious software, or “malware,” refers to any program designed to infect and disrupt computer systems and networks. The risks associated...

Privacy & Identity Protection

How much of your personal info is available online? A simple search could show you plenty.

What you paid for your home, who lives there with you, your age, your children, your driving record, education, occupation,...

Internet Security Privacy & Identity Protection

Less Is More: Why One Antivirus Software Is All You Need

Personal devices and the information they carry are incredibly valuable to their owners. It is only natural to want to protect...

Life at McAfee

For some, accounting is more than just spreadsheets! Vernon’s McAfee Journey

Vernon has been our Manager of Technical Accounting for more than two years, but that doesn’t mean he’s busy with...

How To Guides and Tutorials Privacy & Identity Protection

How To Stay Safe from Phishing Attacks

When you’re online, the world is at your fingertips. You can do amazing things like stream the latest movies while they’re still in theaters! Or...

Internet Security

Ransomware Masquerading as Microsoft Update Targets Home Computers

A new ransomware threat is currently sweeping its way across home computers. And what’s making it extra tricky is that...

Internet Security

Protect yourself from scams this Diwali

It’s Diwali, a time of light, a time of togetherness, and, of course, a time of celebration. Along with Diwali...

Internet Security

What Is Smishing and Vishing, and How Do You Protect Yourself

Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text...

Internet Security

What Are Tailgating Attacks and How to Protect Yourself From Them

Whether you’re spending time on the web or working in the office, you want peace of mind knowing that you...

Internet Security How To Guides and Tutorials

How to Tell Whether a Website Is Safe or Unsafe

It’s important to know that not all websites are safe to visit. In fact, some sites may contain malicious software...

McAfee Labs

New Malicious Clicker found in apps installed by 20M+ users

Authored by SangRyol Ryu Cybercriminals are always after illegal advertising revenue. As we have previously reported, we have seen many...

Privacy & Identity Protection

Toyota Data Breach Exposes Customer Data – What You Can Do to Protect Yourself

Automobile manufacturer Toyota recently announced a data breach that may have exposed the emails of up to 300,000 customers for...

Internet Security Privacy & Identity Protection

True Security Requires a Holistic Approach

In the eyes of hackers, scammers, and thieves, your online privacy and identity look like a giant jigsaw puzzle. One...

Privacy & Identity Protection

57 Million Users Compromised in Uber Leak: Protect Your Digital Privacy and Identity

“I’ll just Uber home.”  Who hails a taxi anymore? These days, city streets are full of double-parked sedans with their...

Internet Security

The Seven Main Phishing Lures of Cybercriminals

One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top