Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security How To Guides and Tutorials Security News

How to Secure Your Yahoo! Mail Account

Last week, Yahoo! announced on their blog that the email accounts for an unspecified number of users had been compromised...

How To Guides and Tutorials

How to Set Up a VPN

In today’s connected world, you can do so much on the internet. It’s never been easier to stay entertained (Netflix,...

How To Guides and Tutorials

How to Set Up a VPN on an Android

There’s no denying that the internet fills a big part of our days. Whether playing, working, or studying, we rely...

How To Guides and Tutorials

How to Set Up a VPN on an iPhone

A virtual private network (VPN) is a tool that hides your geolocation and protects your privacy while you’re online. It...

Internet Security How To Guides and Tutorials

How to Shop Safely This Holiday Season

Yes, there is a Cyber Grinch. In fact, you’ll find evidence of an entire host of grinches online — the...

Internet Security

How To Sidestep Popular Social Scams

Each year, internet users lose billions of dollars to online scams, using clever ploys to trick us out of our...

Internet Security How To Guides and Tutorials

How to Spot a Crypto Scam: The Top Red Flags to Watch For

Cryptocurrency offers exciting opportunities—but it’s also a favorite playground for scammers.   With the rapid rise of deepfake technology and deceptive...

How To Guides and Tutorials

How to Spot a Deepfake on Social Media

Think you can spot a fake on social media? It’s getting tougher. Particularly as deepfake technology gets far better and...

How To Guides and Tutorials Family Safety

How To Spot A Fake Facebook Account

How do you manage your Facebook friends? Do you keep your list really tight and only include ‘active’ pals? Or...

Internet Security How To Guides and Tutorials

How to Spot AI Audio Deepfakes at Election Time

We’ve said it several times in our blogs — it’s tough knowing what’s real and what’s fake out there. And...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Spot and Protect Yourself from Fake Antivirus Software

Most of you know how important it is to have security software on your computers to stay protected from viruses, malware,...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Dating Scams

For years now, the popularity of online dating has been on the rise—and so have the number of online romance...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Fake Art and Deepfakes

Artificial intelligence (AI) is making its way from high-tech labs and Hollywood plots into the hands of the general population....

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Fake Login Pages 

Have you ever come across a website that just didn’t look quite right? Perhaps the company logo looked slightly misshapen,...

Internet Security How To Guides and Tutorials

How to Spot Fake News in Your Social Media Feed

Spotting fake news in your feed has always been tough. Now it just got tougher, thanks to AI.  Fake news...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Phishing Emails and Scams

There are plenty of phish in the sea.  Millions of bogus phishing emails land in millions of inboxes each day...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Spot Phishing Lures

Phishing attacks have all kinds of lures. And many are so tried and true that it makes them easy to...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Spot Phishing Lures During The Holiday Season

And just like that, the holidays are here! That means it’s time to grab your devices and credit cards for some...

How To Guides and Tutorials Privacy & Identity Protection

How To Spot Tech Support Scams

 When something goes wrong with your computer or devices, it can cause a panic. After all, most of us...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot, and Prevent, the Tax Scams That Target Elders

How to Spot, and Prevent, the Tax Scams That Target Elders Elder scams cost seniors in the U.S. some $3...

How To Guides and Tutorials Privacy & Identity Protection

How To Spring Clean Your Digital Devices

Throw open the windows and let in some fresh air. It’s time for spring cleaning. And that goes for your...

How To Guides and Tutorials Mobile Security

How to Squash the Android/TimpDoor SMiShing Scam

As technology becomes more advanced, so do cybercriminals’ strategies for gaining access to our personal information. And while phishing scams...

Family Safety

How to Stay Cyber Safe While Social-Distancing

Do you find yourself working from home these days? Kids off school too? Then your daily life is set to...

How To Guides and Tutorials

How to Stay One Step Ahead of Hackers

Whether using the internet for play or work, you want to spend your time online enjoying the peace of mind...

Internet Security How To Guides and Tutorials

How to Stay Protected From Malware While Online at Home

Our everyday lives are not what they used to be three months ago. Many users have made the transition from...

How To Guides and Tutorials

How to Stay Safe Against Scams While Traveling

Following a whirlwind year of travel in 2023, 40% of Americans are gearing up for even more adventures in 2024....

How To Guides and Tutorials Privacy & Identity Protection

How To Stay Safe from Phishing Attacks

When you’re online, the world is at your fingertips. You can do amazing things like stream the latest movies while they’re still in theaters! Or...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top