Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

How To Guides and Tutorials Privacy & Identity Protection

Internet Privacy: Tips & Tricks for Staying Secure Online

How much value do you place on your personal privacy? You would never leave your wallet on a public park...

Family Safety

25 Amazing Quotes To Inspire You This Fathers Day

Today’s blog post is going to take a little detour off the main road. We’re going to pause from gulping...

Internet Security How To Guides and Tutorials

Top 10 Tips To Stay Safe Online

With hacks, scams, cybercriminals, malware and more, the internet can feel like a dangerous place these days. And, the recent...

Life at McAfee

Women in Sales Part 1: Opportunities for Women Across Cybersecurity Sales

Collaborative, inclusive teams are what redefine cybersecurity solutions for every aspect of our connected world. At McAfee, women are making...

McAfee Labs

Dopple-ganging up on Facial Recognition Systems

Co-authored with Jesse Chick, OSU Senior and Former McAfee Intern, Primary Researcher. Special thanks to Dr. Catherine Huang, McAfee Advanced...

Mobile Security

How Safe Is Your Android PIN Code?

Your Android PIN code is a critical aspect that protects your phone data from unauthorized access. But how safe is this four-digit code? This article aims to demystify this question and offers a comprehensive guide on the safety of Android PIN codes.

Family Safety

Keeping Virtual Play Dates, Hangouts, and Video Chats Safe for Everyone

While virtual playdates, hangouts, and video chats provides an excellent solution for children to interact with their peers, it has also opened up a new avenue for potential risks and dangers. In this article, we will provide some essential strategies for maintaining a secure and enjoyable online social environment for ...

How To Guides and Tutorials

Two-Factor vs. Multi-Factor Authentication: What’s the Difference?

This article breaks down the forms of authentication, explaining how they work and how they can enhance online information security.

Privacy & Identity Protection

The Wearable Future Is Hackable. Here’s What You Need To Know

Quick mental math challenge: How many Apple Watches can you buy with $118 billion dollars? If you guessed around 296...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top