Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Mobile Security

How ‘Switcher’ Malware Moves an Attack from Your Phone to Your Router

Why attack one device when you can get inside an entire network and manipulate every device connected to it? That’s...

How To Guides and Tutorials Family Safety

How You (and Your Teen) Can Stay Safe While Looking for Love Online

Valentine’s Day is such a double-edged sword. If you’re feeling the love and just can’t get enough of your sweetheart...

Life at McAfee

How we’re #InspiringInclusion at McAfee for International Women’s Day 2024

International Women’s Day 2024’s theme, #InspireInclusion, reminds us that genuine change requires going beyond individual actions. It’s about fostering an...

Internet Security

How We Can All Work Together For a Better Internet

Let’s face it – we would not be the same people we are today if it wasn’t for the internet....

Mobile Security Family Safety

How vulnerability disclosure keeps you and your family safe

Surrounded by smart home devices as well as apps which integrate with other services, we are entering an age of...

McAfee Labs

How Visiting a Trusted Site Could Infect Your Employees

The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple...

Internet Security Privacy & Identity Protection Mobile Security

How Virtual Reality and Facebook Photos Helped Researchers Hack Biometric Security

Years ago, holograms were considered science-fiction. Things have changed. Within recent memory, we’ve gone from seeing well-loved, but deceased, cultural...

Privacy & Identity Protection

How Valuable Is Your Health Care Data?

This blog was written by Bruce Snell. Health care is a hot topic in security right now. A quick search...

Privacy & Identity Protection Mobile Security

How Using A VPN Could Save Your Summer

As summer inches closer, I begin to daydream about all the trips I’ll get to take with my family. However,...

Internet Security Privacy & Identity Protection

How USB Drives Were Recently Used to Hand-Deliver Malware

We all have unsolicited mail show up in our mailbox. Whether as advertisements or coupons, companies hope we view them...

Internet Security

How Typosquatting Scams Work

Typosquatting is when someone registers a web address that’s a misspelling of a known website — usually a popular one....

How To Guides and Tutorials Privacy & Identity Protection

How to Wipe Out a Computer Virus

In this article, you’ll learn some of the signs that you may have a computer virus, and you’ll learn tips...

How To Guides and Tutorials Internet Security

How to Win the Battle Against Deepfakes and Malware

As AI deepfakes and malware understandably grab the headlines, one thing gets easily overlooked—AI also works on your side. It...

McAfee Labs

How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner

Introduction This blog describes how McAfee ATP (Adaptive Threat Protection) rules are used within McAfee Endpoint Security products. It will...

Privacy & Identity Protection Family Safety

How to Treat Your Family’s Personal Data Like Gold in a Hyper-Connected World

Tomorrow, January 28, is National Data Privacy Day. While that may not mean a lot to you at first glance, the...

How To Guides and Tutorials Internet Security

How to Tell Whether a Website Is Safe or Unsafe

Wondering if a website is safe? Learn how to check site security, spot red flags, and protect yourself from phishing, malware, and scams. Stay secure online!

How To Guides and Tutorials Privacy & Identity Protection

How To Tell The Difference Between Identity Fraud and Identity Theft?

What’s the difference between identity fraud and identity theft? Well, it’s subtle, so much so that it’s easy to use...

How To Guides and Tutorials Mobile Security

How to Tell If Your Text Message Is Real 

Text message scams are surging, costing consumers more money and time than ever before.   According to McAfee’s latest State of...

Internet Security Privacy & Identity Protection

How To Tell If Your Smart TV Spying on You

Discover how hackers can spy on you through your smart TV's camera, microphone, and apps. Learn how to disable tracking features like ACR, and essential privacy settings to protect yourself from unauthorized surveillance.

How To Guides and Tutorials Mobile Security

How to Tell If Your Phone Has Been Hacked and What to Do

Learn the signs of a hacked phone so you can act quickly and protect your data. Discover tips to secure your phone from hackers and prevent future attacks.

How To Guides and Tutorials Privacy & Identity Protection

How to tell If Your Identity Has Been Stolen

Most of us use the internet every day, so we’re comfortable sharing a lot of information online. However, cybercriminals want...

How To Guides and Tutorials Internet Security

How to Tell if that Online Job Offer is Fake

Just when they need financial security the most, job seekers face another challenge—getting ripped off by job scams.  Scammers will...

How To Guides and Tutorials

How To Teach Your Kids About Deepfakes

Is it real? Is it fake?  Deepfake technology has certainly made everything far more complicated online. How do you know...

How To Guides and Tutorials Family Safety

How to Teach Kids About Online Safety: A Guide

Kids are online now more than ever, not just during free time, but also during school time. It is impossible to always peek over their...

How To Guides and Tutorials Internet Security

How to Talk To Your Kids About Identity Theft

Let’s be honest, talking to your kids about identity theft isn’t probably top of your list. There’s a long list...

How To Guides and Tutorials Family Safety

How to Talk to Your Grandparents About Staying Safe Online

Reports filed with the U.S. Federal Trade Commission (FTC) put the risks in perspective — scammers squarely target older adults....

Internet Security

How To Survive the Deepfake Election with McAfee’s 2024 Election AI Toolkit

As malicious deepfakes continue to flood our screens with disinformation during this election year, we’ve released our 2024 Election AI...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top