Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security How To Guides and Tutorials

How to Recognize a Phishing Email

How do you recognize phishing emails and texts? Even as many of the scammers behind them have sophisticated their attacks,...

Internet Security How To Guides and Tutorials

How To Recognize An Online Scam

It’s been a particularly busy and colourful week, scam-wise in our household. Between 4 family members, we’ve received almost 20...

How To Guides and Tutorials

How to Recognize an Online Scammer

Online scams are evolving faster than ever, with cybercriminals using AI, deepfake technology, and social engineering to trick unsuspecting users....

How To Guides and Tutorials Privacy & Identity Protection

How To Recover Your Identity After It Has Been Stolen

It’s been like this from the start—wherever people shop, do business, or simply gather together, you’ll find thieves in the...

Internet Security How To Guides and Tutorials Mobile Security

How to Remain Secure While Using Running Apps

When gyms were forced to close last year, you likely looked for other ways to get some exercise and stay active during quarantine....

Internet Security How To Guides and Tutorials

How to Remove Personal Information From Data Broker Sites

Data brokers are companies that collect your information from a variety of sources to sell or license it out to...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Remove Trojan Horse Viruses

Basic online scenario—You log onto your computer and notice that something’s just not right, but you can’t quite put your...

How To Guides and Tutorials Family Safety

How to Remove Unwanted Photos of Your Child Online

There’s a chance you may skip this blog post thinking to yourself: This will never happen to my child. I have a...

How To Guides and Tutorials Mobile Security

How to Remove Viruses from Your Android Phone

So, can Android phones get viruses and malware? The answer is yes, and likewise you can do several things to...

How To Guides and Tutorials Family Safety

How to Remove Viruses from Your Android Phone

One of my favorite binges of late is the Netflix series Halt and Catch Fire. It’s a story about the personal...

How To Guides and Tutorials Privacy & Identity Protection

How to Remove Your Personal Information From the Internet

Scammers and thieves can get a hold of personal information in several ways, such as through phishing attacks that lure you into handing it over, malware that steals it from your devices, by purchasing your information on dark web marketplaces, or as a result of information leaked in data breaches, ...

How To Guides and Tutorials Family Safety

How to Report an Online Scam

For many online consumers, money (or the power of it) hovers quietly and invisibly over an online shopping cart only...

How To Guides and Tutorials Privacy & Identity Protection

How to Report Identity Theft to Social Security

In the hands of a thief, your Social Security Number is the master key to your identity.  With a Social Security Number (SSN), a thief can...

How To Guides and Tutorials Family Safety

How to Reset Your Gmail Password After Being Hacked

If you think your Gmail account’s been hacked, you’ll want to act. And act quickly. The fact is that your...

How To Guides and Tutorials Privacy & Identity Protection

How To Safeguard Your Data Privacy

There is certain information that is important to keep to yourself. If a stranger asks for your first name, you are likely to tell them. But if a stranger asks for your bank account number, you are unlikely to tell them. Data privacy works in the same way, if the ...

How To Guides and Tutorials

How to Safeguard Your Digital Assets While Backpacking on a Budget

Traveling on a budget while backpacking allows individuals to immerse themselves fully in local cultures, explore off-the-beaten-path destinations, and forge...

Mobile Security

How to Safely Bank Online

Mobile banking is highly secure — when you take a few straightforward steps, it becomes even safer. And those steps...

How To Guides and Tutorials

How to Safely Connect to Public Wi-Fi While Traveling

As the summer sun beckons us to explore new destinations, many of us rely on public Wi-Fi to stay connected...

Mobile Security

How to Safely Date Online

According to Pew, three-in-ten U.S. adults say they have used a dating site or app. That number climbs to 53%...

How To Guides and Tutorials Mobile Security

How to Safely Incorporate IoT Into Your Fitness Routine

Many have seamlessly transitioned their fitness regimens out of the gym and into the living room since the start of the COVID-19 pandemic,...

How To Guides and Tutorials Mobile Security

How to Secure All Your Everyday Connected Devices

Take a roll call of all your devices that connect to the internet. These include the obvious ones – laptops, tablets, and your smartphone....

McAfee Labs

How to Secure the Future of the Internet of Things

The world of security for the Internet of Things just became more complex. IoT devices are no longer a potential...

Internet Security How To Guides and Tutorials Family Safety Privacy & Identity Protection

How To Secure Your Car’s Computer

Just like any other technological device, car computer systems aren't immune to cyber threats. Cybersecurity attacks on cars can pose serious safety threats and privacy issues.

Internet Security How To Guides and Tutorials

How to Secure Your Digital Wallet

Tapping your phone at the cash register makes for a smooth trip to the store. Far smoother than fumbling for...

Mobile Security Privacy & Identity Protection

How To Secure Your Mobile Devices

As we increasingly depend on our digital devices to store and transfer personal data and use the internet for transactions, we are also becoming increasingly vulnerable to digital attacks on our privacy. Having a PIN on your devices is a simple but effective way to add an extra layer of ...

Internet Security How To Guides and Tutorials

How To Secure Your Online Life? Find Your Protection Score!

I am renowned for getting myself into big messes – particularly in the kitchen when I’m cooking up a storm....

How To Guides and Tutorials Family Safety Privacy & Identity Protection

How to Secure Your Smart Home: A Step-by-Step Guide

How many rooms in your home contain a smart device? From Peloton bikes to showerheads with Bluetooth speakers, smart home technology is rapidly making its way into every room in...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top