Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Protect Yourself from Tax Scams

Tax season is now upon us, and more than ever, we are opting for the convenience of filing taxes online...

How To Guides and Tutorials

How to Protect Yourself From Tailgating Attacks

Holding the door for someone might open the way to a cyberattack. For anyone who works in a secure building...

Internet Security How To Guides and Tutorials

How to Protect Yourself From Social Media Harassment

Some conversations on social media can get … heated. Some can cross the line into harassment. Or worse.  Harassment on...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Protect Yourself From Social Engineering Scams

It’s Social Media Day! How are you celebrating? Reposting your very first profile picture from a decade ago? Sharing your...

How To Guides and Tutorials Mobile Security Privacy & Identity Protection

How To Protect Yourself from SMiShing Attacks

SMiShing is a deceptive practice where scammers send fraudulent text messages masquerading as reputable institutions, aiming to dupe recipients into clicking on a link, calling a number, or providing sensitive personal information. The risk with SMiShing is that mobile users tend to trust their SMS messages more than their emails, ...

How To Guides and Tutorials Mobile Security

How to Protect Yourself from QR Code Scams

Imagine paying $16,000 to park your car in a lot for a couple of hours. That’s what happened to one...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Protect Yourself From Phishing Scams

Ping, it’s a scammer!  The sound of an incoming email, text, or direct message has a way of getting your...

Internet Security How To Guides and Tutorials

How to Protect Yourself from March Madness Scams

It’s the month of top seeds, big upsets, and Cinderella runs by the underdogs. With March Madness basketball cranking up,...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Yourself From Identity Theft After a Data Breach

Did you just get word that your personal information may have been caught up in a data breach? If so,...

How To Guides and Tutorials Security News

How to Protect Yourself From Holiday Shopping Scammers

Like many consumers around the world, you’re probably scouring the internet to find the perfect gifts for your friends and...

Internet Security

How To Protect Yourself from Black Friday and Cyber Monday AI Scams 

As Black Friday approaches, eager bargain hunters are gearing up to snag the best deals online. But with the excitement...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Protect Yourself from Bank Fraud

More and more transactions occur over the internet rather than at a teller’s window, and nearly every account has a username, password, and PIN associated with it. Whether you use online banking regularly or sparingly, you can protect yourself from being the victim of fraud by following a few straightforward ...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Protect Yourself From a Spear Phishing Scam

As the name implies, spear phishing attacks are highly targeted scams. They often occur in professional settings, where the scammers...

How To Guides and Tutorials

How to Protect Yourself from a Brushing Scam

Brushing scams are a type of online fraud where sellers send unsolicited packages to individuals, even though they never made...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Yourself Against Tax Scams

Who else loves tax season besides accountants? Scammers.  It’s high time of year for online risks here in the U.S....

Internet Security How To Guides and Tutorials

How to Protect Yourself Against AI Voice Cloning Attacks

Imagine receiving a call from a loved one, only to discover it’s not them but a convincing replica created by...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How To Protect Your Vote During Election

The 2020 U.S. presidential primaries are right around the corner. As people gear up to cast their ballots for party...

How To Guides and Tutorials

How to Protect Your Streaming Accounts: Lessons from Roku’s Data Leak

In recent news, Roku, a leading streaming platform, reported that over 591,000 user accounts were affected by credential stuffing attacks....

Internet Security How To Guides and Tutorials

How to Protect Your Social Media Passwords with Multi-factor Verification

Two-step verification, two-factor authentication, multi-factor authentication…whatever your social media platform calls it, it’s an excellent way to protect your accounts....

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Social Media Passwords from Hacks and Attacks

What does a hacker want with your social media account? Plenty.  Hackers hijack social media accounts for several reasons. They’ll...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Social Media Accounts

Social media is part of our social fabric. So much so that over 56% of the global population are social...

How To Guides and Tutorials Mobile Security

How to Protect Your Smartphone from SIM Swapping

You consider yourself a responsible person when it comes to taking care of your physical possessions. You’ve never left your wallet in...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to protect your smart home from security threats

This blog post was written by Nick Viney. Have you downloaded the new iOS10 on your iPhone? If you have,...

How To Guides and Tutorials Family Safety

How to Protect Your Smart Cameras and Wi-Fi Baby Monitors

People who use devices like smart cameras and Wi-Fi-enabled baby monitors should strongly consider taking the following steps to protect...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Privacy in a Connected World

Not so long ago computers were our only connection to the internet, but these days we are almost constantly connected,...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Privacy From Tracking Apps

Apps – what would life be without them? Imagine opening a brand-new browser tab every time you wanted to check...

Internet Security How To Guides and Tutorials

How to Protect Your Privacy From Generative AI

With the rise of artificial intelligence (AI) and machine learning, concerns about the privacy of personal data have reached an...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top