Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Protect Yourself From Social Engineering Scams

It’s Social Media Day! How are you celebrating? Reposting your very first profile picture from a decade ago? Sharing your...

Internet Security How To Guides and Tutorials

How to Protect Yourself From Social Media Harassment

Some conversations on social media can get … heated. Some can cross the line into harassment. Or worse.  Harassment on...

How To Guides and Tutorials

How to Protect Yourself From Tailgating Attacks

Holding the door for someone might open the way to a cyberattack. For anyone who works in a secure building...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Protect Yourself from Tax Scams

Tax season is now upon us, and more than ever, we are opting for the convenience of filing taxes online...

Internet Security How To Guides and Tutorials

How to Protect Yourself from Tech Support Imposters

Many of us rely on our technology throughout our everyday lives. So, when something goes wrong, we look to tech...

Internet Security How To Guides and Tutorials

How To Protect Yourself From The Malware That’s Costing Consumers Millions

This blog post was written by Nick Viney. You may have heard about the hack of a Presbyterian Medical Center...

How To Guides and Tutorials Mobile Security

How to Protect Yourself from Vishing

“Vishing” occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Protect Yourself From XLoader Malware

Picture this: you open your MacBook and see an email claiming to be from your favorite online store. In the email,...

Internet Security How To Guides and Tutorials

How to Protect Yourself on Social Networks

There are now over 5 billion active social media users worldwide, representing 62.3% of the global population. While social networks...

How To Guides and Tutorials

How to Quickly Remove Malware

If you’re like most people, you probably use your computer for most of your online activities. It’s amazing what the...

How To Guides and Tutorials Family Safety

How to Raise Responsible Digital Citizens

‘So, what is the ultimate goal of all of our parenting?’ When I asked this question to a group of...

Internet Security How To Guides and Tutorials

How to Recognize a Phishing Email

How do you recognize phishing emails and texts? Even as many of the scammers behind them have sophisticated their attacks,...

Internet Security How To Guides and Tutorials

How To Recognize An Online Scam

It’s been a particularly busy and colourful week, scam-wise in our household. Between 4 family members, we’ve received almost 20...

How To Guides and Tutorials

How to Recognize an Online Scammer

Online scams are evolving faster than ever, with cybercriminals using AI, deepfake technology, and social engineering to trick unsuspecting users....

How To Guides and Tutorials Privacy & Identity Protection

How To Recover Your Identity After It Has Been Stolen

It’s been like this from the start—wherever people shop, do business, or simply gather together, you’ll find thieves in the...

Internet Security How To Guides and Tutorials Mobile Security

How to Remain Secure While Using Running Apps

When gyms were forced to close last year, you likely looked for other ways to get some exercise and stay active during quarantine....

Internet Security How To Guides and Tutorials

How to Remove Personal Information From Data Broker Sites

Data brokers are companies that collect your information from a variety of sources to sell or license it out to...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Remove Trojan Horse Viruses

Basic online scenario—You log onto your computer and notice that something’s just not right, but you can’t quite put your...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top