Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Family Safety

How to Stay Cyber Safe While Social-Distancing

Do you find yourself working from home these days? Kids off school too? Then your daily life is set to...

How To Guides and Tutorials Mobile Security

How to Squash the Android/TimpDoor SMiShing Scam

As technology becomes more advanced, so do cybercriminals’ strategies for gaining access to our personal information. And while phishing scams...

How To Guides and Tutorials Privacy & Identity Protection

How To Spring Clean Your Digital Devices

Throw open the windows and let in some fresh air. It’s time for spring cleaning. And that goes for your...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot, and Prevent, the Tax Scams That Target Elders

How to Spot, and Prevent, the Tax Scams That Target Elders Elder scams cost seniors in the U.S. some $3...

How To Guides and Tutorials Privacy & Identity Protection

How To Spot Tech Support Scams

 When something goes wrong with your computer or devices, it can cause a panic. After all, most of us...

How To Guides and Tutorials Internet Security Privacy & Identity Protection

How to Spot Phishing Lures During The Holiday Season

And just like that, the holidays are here! That means it’s time to grab your devices and credit cards for some...

How To Guides and Tutorials Internet Security Privacy & Identity Protection

How to Spot Phishing Lures

Phishing attacks have all kinds of lures. And many are so tried and true that it makes them easy to...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Phishing Emails and Scams

There are plenty of phish in the sea.  Millions of bogus phishing emails land in millions of inboxes each day...

How To Guides and Tutorials Security News Internet Security Privacy & Identity Protection Mobile Security

How To Spot Health Insurance Scams This Open Enrollment Season

If you’re in the market for insurance right now, keep an eye out for scammers in the mix. They’re out...

How To Guides and Tutorials Internet Security

How to Spot Fake News in Your Social Media Feed

Spotting fake news in your feed has always been tough. Now it just got tougher, thanks to AI.  Fake news...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Fake Login Pages 

Have you ever come across a website that just didn’t look quite right? Perhaps the company logo looked slightly misshapen,...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Fake Art and Deepfakes

Artificial intelligence (AI) is making its way from high-tech labs and Hollywood plots into the hands of the general population....

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Dating Scams

For years now, the popularity of online dating has been on the rise—and so have the number of online romance...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Charity Scams and Donate Safely this Giving Season

The holidays are the season of giving; unfortunately, it’s also the season when scammers try to cash in on the...

How To Guides and Tutorials Internet Security Privacy & Identity Protection

How to Spot and Protect Yourself from Fake Antivirus Software

Most of you know how important it is to have security software on your computers to stay protected from viruses, malware,...

How To Guides and Tutorials Privacy & Identity Protection Family Safety

How to Spot and Avoid Clickbait

Clickbait may look harmless, like a fun quiz or game, but it can steal your data. Learn what clickbait means, its risks, and how to avoid these traps online.

How To Guides and Tutorials Internet Security

How to Spot AI Audio Deepfakes at Election Time

We’ve said it several times in our blogs — it’s tough knowing what’s real and what’s fake out there. And...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot a Fake GLP-1 Weight-Loss Drug Before You Buy

“I thought I was getting a trusted weight-loss medication, but instead, I ended up sick and scammed. I never imagined...

How To Guides and Tutorials Family Safety

How To Spot A Fake Facebook Account

How do you manage your Facebook friends? Do you keep your list really tight and only include ‘active’ pals? Or...

How To Guides and Tutorials

How to Spot a Deepfake on Social Media

Think you can spot a fake on social media? It’s getting tougher. Particularly as deepfake technology gets far better and...

How To Guides and Tutorials Internet Security

How to Spot a Crypto Scam: The Top Red Flags to Watch For

Cryptocurrency offers exciting opportunities—but it’s also a favorite playground for scammers.   With the rapid rise of deepfake technology and deceptive...

Internet Security

How To Sidestep Popular Social Scams

Each year, internet users lose billions of dollars to online scams, using clever ploys to trick us out of our...

How To Guides and Tutorials Internet Security

How to Shop Safely This Holiday Season

Yes, there is a Cyber Grinch. In fact, you’ll find evidence of an entire host of grinches online — the...

How To Guides and Tutorials Internet Security

How to Shop Safely During Amazon Prime Day

As Amazon Prime Day approaches (July 8-11, 2025), millions of shoppers are gearing up for what promises to be one...

How To Guides and Tutorials

How to Set Up a VPN on an iPhone

A virtual private network (VPN) is a tool that hides your geolocation and protects your privacy while you’re online. It...

How To Guides and Tutorials

How to Set Up a VPN on an Android

There’s no denying that the internet fills a big part of our days. Whether playing, working, or studying, we rely...

How To Guides and Tutorials

How to Set Up a VPN

In today’s connected world, you can do so much on the internet. It’s never been easier to stay entertained (Netflix,...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top