Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

How To Guides and Tutorials Privacy & Identity Protection

How To Spot Tech Support Scams

 When something goes wrong with your computer or devices, it can cause a panic. After all, most of us...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Spot Phishing Lures During The Holiday Season

And just like that, the holidays are here! That means it’s time to grab your devices and credit cards for some...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Spot Phishing Lures

Phishing attacks have all kinds of lures. And many are so tried and true that it makes them easy to...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Phishing Emails and Scams

There are plenty of phish in the sea.  Millions of bogus phishing emails land in millions of inboxes each day...

Internet Security How To Guides and Tutorials

How to Spot Fake News in Your Social Media Feed

Spotting fake news in your feed has always been tough. Now it just got tougher, thanks to AI.  Fake news...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Fake Login Pages 

Have you ever come across a website that just didn’t look quite right? Perhaps the company logo looked slightly misshapen,...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Fake Art and Deepfakes

Artificial intelligence (AI) is making its way from high-tech labs and Hollywood plots into the hands of the general population....

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Dating Scams

For years now, the popularity of online dating has been on the rise—and so have the number of online romance...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Spot and Protect Yourself from Fake Antivirus Software

Most of you know how important it is to have security software on your computers to stay protected from viruses, malware,...

Internet Security How To Guides and Tutorials

How to Spot AI Audio Deepfakes at Election Time

We’ve said it several times in our blogs — it’s tough knowing what’s real and what’s fake out there. And...

How To Guides and Tutorials Family Safety

How To Spot A Fake Facebook Account

How do you manage your Facebook friends? Do you keep your list really tight and only include ‘active’ pals? Or...

How To Guides and Tutorials

How to Spot a Deepfake on Social Media

Think you can spot a fake on social media? It’s getting tougher. Particularly as deepfake technology gets far better and...

Internet Security How To Guides and Tutorials

How to Spot a Crypto Scam: The Top Red Flags to Watch For

Cryptocurrency offers exciting opportunities—but it’s also a favorite playground for scammers.   With the rapid rise of deepfake technology and deceptive...

Internet Security

How To Sidestep Popular Social Scams

Each year, internet users lose billions of dollars to online scams, using clever ploys to trick us out of our...

Internet Security How To Guides and Tutorials

How to Shop Safely This Holiday Season

Yes, there is a Cyber Grinch. In fact, you’ll find evidence of an entire host of grinches online — the...

How To Guides and Tutorials

How to Set Up a VPN on an iPhone

A virtual private network (VPN) is a tool that hides your geolocation and protects your privacy while you’re online. It...

How To Guides and Tutorials

How to Set Up a VPN on an Android

There’s no denying that the internet fills a big part of our days. Whether playing, working, or studying, we rely...

How To Guides and Tutorials

How to Set Up a VPN

In today’s connected world, you can do so much on the internet. It’s never been easier to stay entertained (Netflix,...

Internet Security How To Guides and Tutorials Security News

How to Secure Your Yahoo! Mail Account

Last week, Yahoo! announced on their blog that the email accounts for an unspecified number of users had been compromised...

How To Guides and Tutorials Family Safety Privacy & Identity Protection

How to Secure Your Smart Home: A Step-by-Step Guide

How many rooms in your home contain a smart device? From Peloton bikes to showerheads with Bluetooth speakers, smart home technology is rapidly making its way into every room in...

Internet Security How To Guides and Tutorials

How To Secure Your Online Life? Find Your Protection Score!

I am renowned for getting myself into big messes – particularly in the kitchen when I’m cooking up a storm....

Mobile Security Privacy & Identity Protection

How To Secure Your Mobile Devices

As we increasingly depend on our digital devices to store and transfer personal data and use the internet for transactions, we are also becoming increasingly vulnerable to digital attacks on our privacy. Having a PIN on your devices is a simple but effective way to add an extra layer of ...

Internet Security How To Guides and Tutorials

How to Secure Your Digital Wallet

Tapping your phone at the cash register makes for a smooth trip to the store. Far smoother than fumbling for...

Internet Security How To Guides and Tutorials Family Safety Privacy & Identity Protection

How To Secure Your Car’s Computer

Just like any other technological device, car computer systems aren't immune to cyber threats. Cybersecurity attacks on cars can pose serious safety threats and privacy issues.

McAfee Labs

How to Secure the Future of the Internet of Things

The world of security for the Internet of Things just became more complex. IoT devices are no longer a potential...

How To Guides and Tutorials Mobile Security

How to Secure All Your Everyday Connected Devices

Take a roll call of all your devices that connect to the internet. These include the obvious ones – laptops, tablets, and your smartphone....

How To Guides and Tutorials Mobile Security

How to Safely Incorporate IoT Into Your Fitness Routine

Many have seamlessly transitioned their fitness regimens out of the gym and into the living room since the start of the COVID-19 pandemic,...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top