Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

How To Guides and Tutorials

How to Protect Your Online Privacy

When you open your laptop or your mobile device, what is the first thing you do? Do you head to your...

How To Guides and Tutorials Mobile Security

How to Protect Your Mobile Device From Loss and Theft

The unfortunate reality of our digital era is that devices are lost, misplaced, or stolen every day. A mobile device without password protection is a gold mine for anyone with malicious intent.

How To Guides and Tutorials Internet Security

How to Protect Your LinkedIn Account

If you’re a LinkedIn user, log in now and strengthen your security. Reports indicate that LinkedIn accounts are under attack....

How To Guides and Tutorials Internet Security

How to Protect Your Kids From Inappropriate Online Content

Inquisitive, curious and fiercely independent. These are the three words that come to mind when I remember my boys as...

How To Guides and Tutorials

How to Protect Your Internet-Connected Healthcare Devices

Fitness trackers worn on the wrist, glucose monitors that test blood sugar without a prick, and connected toothbrushes that let...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Identity, Finances, and Security Online

If you want to protect your identity, finances, and privacy online, you have a pretty powerful tool at hand. It’s...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Identity Before You Leave on Vacation

Your summer vacation is approaching quickly! You can’t wait to take time away from your responsibilities, jump out of your...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Financial Data During Tax Season

W-2 phishing scams often involve emails that appear to be from the IRS or another official source, requesting personal information. The goal is to trick the recipient into revealing confidential data, such as social security numbers and financial information, which the perpetrator can then use for fraudulent purposes.

How To Guides and Tutorials Family Safety

How To Protect Your Family’s Smartphones While on Vacation

Summer is synonymous with vacations, a time when families pack their bags, grab their sunscreen, and embark on exciting adventures....

How To Guides and Tutorials Family Safety

How to Protect Your Family’s Privacy on Twitter: A Guide for Parents and Kids

It’s no secret that when it comes to social networks, teen preferences can change dramatically from year to year. That...

How To Guides and Tutorials Family Safety

How to Protect Your Family From AI Scams

AI scams are becoming increasingly common. With the rise of artificial intelligence and technology, fraudulent activity is becoming more sophisticated...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Digital Identity

People under 60 are losing it online. And by it, I mean money—thanks to digital identity theft.  In its simplest form,...

How To Guides and Tutorials Privacy & Identity Protection

How To Protect Your Digital Estate

While we’re enjoying all the good things in our digital lives—our eBooks, movies, email accounts, social media profiles, eBay stores,...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Devices from a Fast Spreading Java Virus

Last week, a new security issue surfaced for a popular programming language known as Java. This Java security issue is...

How To Guides and Tutorials

How to Protect Your Data While On-the-Go

Winter travel is filled with excitement—whether you’re heading to a snow-covered ski resort, visiting family for the holidays, or enjoying...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Credit Score

It has a way of sneaking up on you. Credit theft and fraud.   Maybe it’s happened to you. Maybe it’s...

How To Guides and Tutorials Internet Security Privacy & Identity Protection

How to Protect Your Connected Devices from Common Cyberattacks

When it comes to internet security, we all suffer from a condition known as optimism bias. It’s the simple idea...

Family Safety Privacy & Identity Protection

How to Protect Your Child from Identity Theft in 8 Easy Steps

With all the things to knock out on your parenting to-do list, when’s the last time you thought to monitor...

Mobile Security Internet Security

How To Protect Today’s Smart Home

We love our kids, and we want the best for them. In today’s connected world, the role of a parent...

How To Guides and Tutorials Mobile Security

How to Protect Three Common IoT Devices in 2019

It’s no secret – IoT devices are creeping into every facet of our daily lives. In fact, Gartner estimates there will...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect the Smart Devices in Your Home

Outfitting your smart home could get a whole lot easier this year.  A new industry standard called Matter aims to...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect School Children From Deep Fakes

Deep fakes are a growing concern in the age of digital media and can be extremely dangerous for school children....

How To Guides and Tutorials

How to Protect Kids From Harmful Online Content

November 20 is World Children’s Day, a day that celebrates “international togetherness, awareness among children worldwide, and improving children’s welfare.”...

McAfee Labs

How to Protect Against WannaCry Ransomware in a McAfee Environment

WannaCry is a ransomware family targeting Microsoft Windows. On Friday May 12, a large cyberattack based on this threat was launched. At this time, it is estimated that more than 250,000 computers in 150 countries have been infected, each demanding a ransom payment.

McAfee Labs

How to Protect Against Petya Ransomware in a McAfee Environment

A new variant of the ransomware Petya (also called Petrwrap) began spreading around the world on June 27. Petya is ransomware that exploits the vulnerability CVE-2017-0144 in Microsoft’s implementation of the Server Message Block protocol. This ransomware encrypts the master boot records of infected Windows computers, making the machines unusable.

McAfee Labs

How to Protect Against OpenSSL 1.1.0a Vulnerability CVE-2016-6309

This blog post was written by Rock Liu. Recently the OpenSSL security library gained a fix for a critical security...

How To Guides and Tutorials Mobile Security

How to Protect Against New Types of Scams Like QR Phishing

Four in ten Americans say they use peer-to-peer payment services, like Venmo, PayPal, or Apple Pay, at least once a...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top