Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee Labs

Vulnerability Discovery in Open Source Libraries: Analyzing CVE-2020-11863

Open Source projects are the building blocks of any software development process. As we indicated in our previous blog, as...

Privacy & Identity Protection Family Safety

What Makes My Passwords Vulnerable?

Passwords serve as the first line of defense against unauthorized access to our online accounts, be it email, social media, banking, or other sensitive platforms. Let's explore the common techniques for cracking passwords, and learn how to stay one step ahead in the ongoing battle for online security.

Internet Security Privacy & Identity Protection Mobile Security

Medical Care From Home: Telemedicine and Seniors

For weeks and even months now, millions of us have relied on the internet in ways we haven’t before. We’ve...

Privacy & Identity Protection Mobile Security

How To Secure Your Mobile Devices

As we increasingly depend on our digital devices to store and transfer personal data and use the internet for transactions, we are also becoming increasingly vulnerable to digital attacks on our privacy. Having a PIN on your devices is a simple but effective way to add an extra layer of ...

How To Guides and Tutorials Privacy & Identity Protection

How To Protect Your Privacy During a Medical Data Breach

We put our trust in these healthcare institutions, expecting them to take the necessary steps to store our sensitive data securely. However, with a significant rise in medical data breaches, it has become more important to understand how these breaches occur and how we can protect ourselves.

Internet Security Privacy & Identity Protection

Together, We Block and Tackle to Give You Peace of Mind

As a leader in cybersecurity, we at McAfee understand that every aspect of your digital life has potential weak spots...

How To Guides and Tutorials Privacy & Identity Protection

How To Clean Your Digital Habits

You’ve been fortunate over the years — no lost phone, no credit card fraud, no computer viruses. Still, deep down, you fear your sloppy digital habits will eventually catch up with you. Here are seven easy ways to tighten up your digital habits.

Life at McAfee

How Piyush’s remarkable efforts ignited a larger impact of giving back

At McAfee, we support team members who are passionate about giving back. You are encouraged and empowered to make a substantial impact in improving our community and volunteering to help others. ...

Family Safety

Handling Social Media Stress for Teens

Our society is undeniably superbly interconnected, and our digital persona is greatly treasured. However, this isn't always beneficial, especially for teenagers who may be overwhelmed by the deluge of information, leading to stress.

Privacy & Identity Protection Family Safety

Spyware: A Major Identity Theft Threat

Spyware is a type of malicious software that collects information about users without their knowledge. It can track every action, from keystrokes to browsing habits, thus presenting a grave threat to user privacy and security.

Internet Security Privacy & Identity Protection Mobile Security

Telehealth, Distance Learning, & Online Banking: Securing Digital Frontiers

2020 has propelled us into a new digital reality – one where we are reliant on technology to help us...

Family Safety

Can You Decode Your Teen’s Texting Language?

It’s hard to believe, right, parents? In just a blink or two, you went from being the teenager dropping cool phrases like...

Internet Security Privacy & Identity Protection

Evolving Security Products for the new Realities of Living Life From Home

Announcing McAfee’s Enhanced Consumer Security for New Consumer Realities With millions of people continuing to work and study remotely, scammers have...

How To Guides and Tutorials Internet Security

Staying Safe While Working Remotely

In the shadow of the COVID-19 pandemic, workplaces worldwide have undergone a seismic shift towards remote working. This article aims to provide a comprehensive guide on how you, as an employee, can augment your cybersecurity measures and stay safe when working remotely.

Family Safety

If You Give A Hacker Your Email Address…

Your email address, innocuous as it may seem, is often one of the gateways into your digital persona. This article aims to shed light on the potential dangers and impacts of giving away your email address to the wrong people.

Internet Security Family Safety

Celebrities Are Lures For Scammers

Through this guide, we aim to shed light on how scammers take advantage of the global fascination with celebrities to target their potential victims.

Family Safety

Could Your Kids Spot an Online Predator?

As parents, caregivers, and mentors, it's our responsibility to educate and guide our children about the virtual perils that lurk within their screens. An essential part of this is continuous communication, ensuring they understand the gravity of the situation and can recognize the deceptive tactics employed by these predators

Family Safety

A Detailed Guide on Cyberbullying

Unfortunately, cyberbullying has become a prevalent and emerging threat in our digital age. Therefore, it's crucial to understand how to help your children navigate and mitigate this pervasive, especially now that they can leave digital footprints anywhere and encounter people with bad intentions.

Internet Security Mobile Security

Smart TVs and Refrigerators Used in Internet-of-Things Cyberattack

In this article, we’ll explore what happened when hundreds of thousands of these devices were roped into an extensive Internet-of-Things (IoT) cyber attack, how it happened, and how you can protect your smart devices to stay safe.

Mobile Security

Before You Download: Steer Clear of Malicious Android Apps

Cybercriminals like to get in on a good thing. Case in point, mobile apps. We love using apps and they love making bogus ones—malicious apps designed to harm phones and possibly the person using them. The good news is that there are ways you can spot these imposters. These six ...

How To Guides and Tutorials Internet Security

U.S. Election 2020 – Don’t Let COVID-19 Misinformation Suppress Your Vote

U.S. Election 2020 – Don’t Let COVID-19 Misinformation Suppress Your Vote   In the early days of the COVID-19 pandemic, another...

Internet Security Privacy & Identity Protection McAfee News

ST22: Attivo Networks with Greg Vinson & Tushar Kothari

Threat Solutions McAfee’s Global Business Development Manager, Greg Vinson and CEO of Attivo Networks, Tushar Kothari discuss the solutions to...

Security News Internet Security McAfee News

Career change? Cybersecurity companies are hiring.

Career change? Cybersecurity companies are hiring. If you’re thinking career change or career shift, there’s a field that has an...

Internet Security

Stay Connected & Protected: Weaving Security Into Our Social Media Habits

Stay Connected & Protected: Weaving Security Into Our Social Media Habits Today, there are so many different avenues where we...

Family Safety

8 Ways to Help Senior Adults Stay Safe Online These Days

8 Ways to Help Senior Adults Stay Safe Online These Days Technology has come in handy for most of us...

Security News Internet Security Privacy & Identity Protection

Cybersecurity Awareness Month Helps Us All be #BeCyberSmart

Cybersecurity Awareness Month Helps Us All be #BeCyberSmart October is Cybersecurity Awareness Month, which is led by the National Cyber...

How To Guides and Tutorials

Election 2020 – Five Tips to Secure a Mail-In Ballot That Counts

Election 2020 – Five Tips to Secure a Mail-In Ballot That Counts Forecasts predict that roughly 80 million votes will...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top