Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security Privacy & Identity Protection

How to Make Sure Your Gmail Account is Protected in Light of Recent AI Scams

The rise of AI-driven cyber threats has introduced a new level of sophistication to phishing scams, particularly those targeting Gmail...

How To Guides and Tutorials Mobile Security Privacy & Identity Protection

How to Make Telehealth Safer for a More Convenient Life Online

Among the many major shifts in lifestyle during the COVID-19 pandemic, the way we used healthcare was one of the...

Family Safety

How To Manage Screen Time These Holidays

Gosh I love December. The kids are on school holidays, the homework has finished and work is quietening down. Bliss...

How To Guides and Tutorials Privacy & Identity Protection

How to Manage Your Browser Cookies

What are browser cookies? What is cookie hijacking? How can cookies compromise your browser security? Check out McAfee’s tips that can make your browser experience and cookies history more secure. 

Internet Security

How to Maximize the Latest McAfee+ Enhancements for Peace of Mind This Autumn

As we head into a season filled with moments that matter to consumers – from the upcoming U.S. election to...

Internet Security

How To Minimise the Fallout From a Data Breach

There used to be a saying that ‘nothing is certain except death and taxes’. Well, I now think it needs...

Mobile Security Privacy & Identity Protection

How to Navigate this Connected World

This blog was written in collaboration with Kishore Jotwani, Sr. Director of Marketing & Business Development for Intel’s Wireless Consumer Infrastructure...

Internet Security How To Guides and Tutorials

How To Practise Good Social Media Hygiene

Fact – your social media posts may affect your career, or worse case, your identity! New research from the world’s...

How To Guides and Tutorials Family Safety

How to Prepare for Your Child’s First Smartphone

If only more things in life came with training wheels; a child’s first smartphone could certainly use some.  Like taking off the training wheels...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How To Prevent Downloading Malicious Software

Malware—the term seems to be at the center of the news every day, with each headline telling of a new...

How To Guides and Tutorials Privacy & Identity Protection

How to Prevent Doxxing and How You Can Lock Down Your Data

Have you ever been online and replied to a comment or post? Maybe it was on Reddit or on an...

How To Guides and Tutorials

How to Prevent Keyboard Snooping Attacks on Video Calls

Video conferencing has really taken off this year. With more people working and learning from home than ever before, video...

How To Guides and Tutorials Privacy & Identity Protection

How To Prevent Ransomware

Ransomware. Even the name sounds scary.  When you get down to it, ransomware is one of the nastiest attacks a...

How To Guides and Tutorials Privacy & Identity Protection

How To Prevent Ransomware

Ransomware. Even the name sounds scary.  When you get down to it, ransomware is one of the nastiest attacks a...

Internet Security How To Guides and Tutorials Family Safety

How To Prevent Your Emails From Being Hacked

My mother recently turned 80, so of course a large celebration was in order. With 100 plus guests, entertainment, and...

How To Guides and Tutorials Mobile Security

How to Protect Against New Types of Scams Like QR Phishing

Four in ten Americans say they use peer-to-peer payment services, like Venmo, PayPal, or Apple Pay, at least once a...

McAfee Labs

How to Protect Against OpenSSL 1.1.0a Vulnerability CVE-2016-6309

This blog post was written by Rock Liu. Recently the OpenSSL security library gained a fix for a critical security...

McAfee Labs

How to Protect Against Petya Ransomware in a McAfee Environment

A new variant of the ransomware Petya (also called Petrwrap) began spreading around the world on June 27. Petya is ransomware that exploits the vulnerability CVE-2017-0144 in Microsoft’s implementation of the Server Message Block protocol. This ransomware encrypts the master boot records of infected Windows computers, making the machines unusable.

McAfee Labs

How to Protect Against WannaCry Ransomware in a McAfee Environment

WannaCry is a ransomware family targeting Microsoft Windows. On Friday May 12, a large cyberattack based on this threat was launched. At this time, it is estimated that more than 250,000 computers in 150 countries have been infected, each demanding a ransom payment.

How To Guides and Tutorials

How to Protect Kids From Harmful Online Content

November 20 is World Children’s Day, a day that celebrates “international togetherness, awareness among children worldwide, and improving children’s welfare.”...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect School Children From Deep Fakes

Deep fakes are a growing concern in the age of digital media and can be extremely dangerous for school children....

How To Guides and Tutorials Privacy & Identity Protection

How to Protect the Smart Devices in Your Home

Outfitting your smart home could get a whole lot easier this year.  A new industry standard called Matter aims to...

How To Guides and Tutorials Mobile Security

How to Protect Three Common IoT Devices in 2019

It’s no secret – IoT devices are creeping into every facet of our daily lives. In fact, Gartner estimates there will...

Internet Security Mobile Security

How To Protect Today’s Smart Home

We love our kids, and we want the best for them. In today’s connected world, the role of a parent...

Family Safety Privacy & Identity Protection

How to Protect Your Child from Identity Theft in 8 Easy Steps

With all the things to knock out on your parenting to-do list, when’s the last time you thought to monitor...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Connected Devices from Common Cyberattacks

When it comes to internet security, we all suffer from a condition known as optimism bias. It’s the simple idea...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Credit Score

It has a way of sneaking up on you. Credit theft and fraud.   Maybe it’s happened to you. Maybe it’s...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top