Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Family Safety

7 Things Parents Need to Know About the Voxer Voice App

Every five minutes, it seems, a new app comes out but only a handful stick with tweens and teens looking...

Family Safety

7 Things to Look for on Your Teen’s Instagram

  Over 300 million users post an average of 70 million photos and hit the like button 2.5 billion times...

How To Guides and Tutorials Family Safety

7 Tips to Boost Your Family Goal Setting for 2015

To catch a vision for your family in the year ahead first requires a brief look back. What worked in...

How To Guides and Tutorials Family Safety

7 Tips to Help Your Teen Avoid Conflict in Group Texts

If you’ve ever had a conversation over email or text take a sudden nosedive due to miscommunication, then buckle up—you...

How To Guides and Tutorials Mobile Security Family Safety

7 Tips to Make Sure Your Smartphone Use Doesn’t Ruin Holiday Gatherings

The gravy wasn’t the only thing steaming at the Thanksgiving table this year. Grandma wasn’t happy. It turns out that...

Mobile Security

7 Tips to Protect Your Devices and Private Information from Ransomware

Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly...

How To Guides and Tutorials Mobile Security

7 Tips to Protect Your Smartphone from Getting Hacked

There’s little rest for your hard-working smartphone. If you’re like many professionals today, you use it for work, play, and a mix of personal business in between. Now, what if something went wrong with that phone, like loss or theft? Worse yet, what if your smartphone got hacked? Where would ...

How To Guides and Tutorials Family Safety

7 Tips: How to Raise a Leader in a ‘Follower’ World

Leadership training isn’t exclusive to adults. And in today’s online culture of “following” and digital profiles, it’s never too early...

Internet Security

7 Types of Hacker Motivations

The purpose behind an attack changes everything about how hackers shape their tactics and how the hacking process unfolds: who is targeted, which methods and tools are used, how patient the attacker is, and the kind of damage they want to cause.

Subscribe to McAfee Securing Tomorrow Blogs

Back to top