Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Life at McAfee

How I Use McAfee’s Volunteer Time Off to Help Lost Paws Find Homes

by Christine, Sales Operations, Plano Imagine sixteen paws, eight floppy ears and four wagging tails happily greeting you at the door—that’s...

How To Guides and Tutorials Internet Security

How I try to live safer…

This blog was written by Scott Montgomery, McAfee’s previous vice president and chief technology officer of public sector. My McAfee...

Life at McAfee

How I Thrive in Technology at McAfee

By: Hannah, Software Quality Assurance Engineer I joined the McAfee Quality Assurance team at the Brighton office earlier this year....

McAfee News Life at McAfee

How I Seized McAfee’s Opportunities to Realize My Potential

This post was written by Emmanuel Making the most of opportunities and putting in the work with an employer who...

How To Guides and Tutorials Internet Security

How I Live Safe: 3 Tips for Staying Secure Online

As a security professional, online safety is always on my mind. Especially when I’m using my personal devices, rather than...

Life at McAfee

How I Got Here: Trevor’s Career Journey Across Four Countries and Five Roles

In this career-journey series, Marketing Director Trevor shares why patient listening is the most helpful skill he’s acquired, the top...

Internet Security Privacy & Identity Protection

How Hackers Use Popular Shows to Infect Your Devices

If there’s one reasonable measurement of how popular a television series has become, it’s how often it’s illegally downloaded online....

McAfee Labs

How Hackers Bypassed an Adobe Flash Protection Mechanism

The number of Flash Player exploits has recently declined, due to Adobe’s introduction of various measures to strengthen Flash’s security....

Internet Security Privacy & Identity Protection

How Hackers are Using Heartbleed to Trick You into Infecting Your Computer

Heartbleed, a vulnerability affecting nearly 70% of websites on the Internet, was discovered two months ago. It was big. It...

Internet Security

How Googling Our Favourite Celebrities Is A Risky Business

Did you know that searching for your favourite celebrities online may very well increase your chance of running into trouble?...

How To Guides and Tutorials Internet Security Privacy & Identity Protection

How Free VPNs Come With a Price

The number of people who use VPNs (virtual private networks) continues to mushroom. Recent research shows that 46% of American...

Privacy & Identity Protection

How Fraudsters Are Fooling Users With This Proof of Vaccination Phishing Scam

You open your laptop and see an email from a healthcare organization that you don’t recognize. The subject line reads “URGENT –...

Internet Security

How Fraudsters Are Exploiting the Taylor Swift and Travis Kelce Engagement

When news of Taylor Swift and Travis Kelce’s engagement broke recently, fans around the world celebrated this real-life love story....

Family Safety

How Extremist Groups Target Teens Online

With the reality of the digital age, the internet has become a vital part of our daily lives. While it offers immense benefits, the online world also has its potential risks. One such alarming issue involves extremist groups targeting impressionable teenagers online.

Internet Security

How Entertaining Ourselves at Home Has Become a Risky Business

Online entertainment is certainly having a moment. While we all stayed home and socially distanced, many of us filled our...

Mobile Security

How Does Jailbreaking Or Rooting Affect My Mobile Device Security?

In today’s interconnected world, our mobile devices serve as essential tools for communication, productivity, and entertainment. However, for some tech-savvy...

Privacy & Identity Protection Mobile Security Family Safety

How Do Your Digital Assets Compare?

My Dad is in his mid 60’s and retired. And the man knows how to live. A day doesn’t go...

How To Guides and Tutorials Privacy & Identity Protection

How Do You Remove Your Information From the Internet?

Take steps to delete your internet footprint and regain control of your personal data. Learn how to get your information off the internet.

How To Guides and Tutorials Internet Security

How Do You Manage Your Social Media Privacy?

‘Ensure your privacy settings are set to the highest level’ – if you’ve been reading my posts for a bit...

Life at McAfee

How Do You #PressForProgress?

By Marty, Regional Sales Director March 8th marks the 108th year the world has celebrated International Women’s Day. During those...

Privacy & Identity Protection Family Safety

How Do I Protect Myself When Using Wi-Fi?

Wi-Fi is everywhere. Whether you travel for business or simply need Internet access while out and about, your options are...

Privacy & Identity Protection Mobile Security Family Safety

How Do I Live Safe?

This blog was written by Bruce Snell. You may have seen #HowILiveSafe floating around on Twitter.  We thought it would...

How To Guides and Tutorials Mobile Security Family Safety

How Do Hackers Hack Phones and How Can I Prevent It?

Understand common hacker attack methods and how to prevent and protect your data. Stay safe from phishing, malware, and other mobile security threats.

How To Guides and Tutorials

How Data Brokers Sell Your Identity

Data Privacy Week is here, and there’s no better time to shine a spotlight on one of the biggest players...

Internet Security Privacy & Identity Protection

How Cybercriminals Are Shopping for Personal Data This Black Friday

While the majority of us look forward to Black Friday and Cyber Monday for the best deals, there’s another group...

Family Safety

How Cyberbullying Looks In Australia in 2023

There’s no doubt that cyber bullying ranks towards the top of most parents ‘worry list’. As a mum of 4,...

Family Safety

How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family

Like stockbrokers watch the market, cybercriminals keep an eye on the public’s latest obsessions. And, once they spot a trend...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top