Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

How To Guides and Tutorials Family Safety

How to Keep Your Kids Safe Online

I often joke about how I wish I could wrap up my kids in cotton wool to protect them from...

Internet Security

How Ozempic Scams Put People’s Finances and Health at Risk

As pharmacies each week fill more than one million prescriptions for Ozempic and other GLP-1 weight loss drugs, scammers are...

Internet Security How To Guides and Tutorials

How to Protect Your Personal Data

All your online activity creates a trail of data. And that data tells a story. The story of you.  The...

Family Safety

Family-Friendly Online Safety Tips for Summer Vacations

Summer vacations are a time for families to relax, unwind, and create lasting memories together. Whether you’re heading to the...

Internet Security How To Guides and Tutorials

How to Delete Your Browser History

Deleting your browsing history has its benefits. For one, it can improve the performance of your device. Secondly, it can...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How Free VPNs Come With a Price

The number of people who use VPNs (virtual private networks) continues to mushroom. Recent research shows that 46% of American...

Internet Security How To Guides and Tutorials Family Safety

How To Prevent Your Emails From Being Hacked

My mother recently turned 80, so of course a large celebration was in order. With 100 plus guests, entertainment, and...

How To Guides and Tutorials

How to Stay Safe Against Scams While Traveling

Following a whirlwind year of travel in 2023, 40% of Americans are gearing up for even more adventures in 2024....

Mobile Security McAfee Labs

Fake Bahrain Government Android App Steals Personal Data Used for Financial Fraud

Authored by Dexter Shin Many government agencies provide their services online for the convenience of their citizens. Also, if this...

How To Guides and Tutorials

What You Need to Know About Election Security

As election season approaches, the importance of safeguarding our democratic processes has never been more critical. Ensuring election security is...

Internet Security How To Guides and Tutorials Privacy & Identity Protection

How to Protect Yourself From a Spear Phishing Scam

As the name implies, spear phishing attacks are highly targeted scams. They often occur in professional settings, where the scammers...

Internet Security

The Top 10 Riskiest Online Destinations Revealed

As Americans make their travel plans, scammers lie in wait. We’ve uncovered the top ten “riskiest” destinations for travel scams...

Internet Security

Deepfake Drama: How Gwyneth Paltrow Became the Latest Target in AI Deception

As technology advances, so do the methods used by cybercriminals to spread misinformation and scams. One of the most concerning...

Internet Security How To Guides and Tutorials

What to Do If Your Email Is Hacked

I think I could count on my hand the people I know who have NOT had their email hacked. Maybe...

Mobile Security

How to Safely Date Online

According to Pew, three-in-ten U.S. adults say they have used a dating site or app. That number climbs to 53%...

How To Guides and Tutorials Family Safety

How To Spot A Fake Facebook Account

How do you manage your Facebook friends? Do you keep your list really tight and only include ‘active’ pals? Or...

McAfee Labs

How Scammers Hijack Your Instagram

Authored by Vignesh Dhatchanamoorthy, Rachana S Instagram, with its vast user base and dynamic platform, has become a hotbed for...

How To Guides and Tutorials Mobile Security Family Safety

How Do Hackers Hack Phones and How Can I Prevent It?

The threat of having your phone hacked has become a common fear. The truth is that it is possible to hack any phone. With the advancement of technology, where discovery of knowledge and information advances the understanding of technology, hackers are able to hack even the most sophisticated phone software. ...

How To Guides and Tutorials

How to Protect Your Internet-Connected Healthcare Devices

Fitness trackers worn on the wrist, glucose monitors that test blood sugar without a prick, and connected toothbrushes that let...

McAfee Labs

From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats

Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as “Asynchronous Remote Access Trojan,” represents a highly sophisticated malware...

How To Guides and Tutorials Privacy & Identity Protection

How to Report Identity Theft to Social Security

In the hands of a thief, your Social Security Number is the master key to your identity.  With a Social Security Number (SSN), a thief can...

Internet Security

McAfee and Intel Collaborate to Combat Deepfakes with AI-Powered Deepfake Detection

In a world where deepfake scams and misinformation are on the rise, McAfee has announced significant enhancements to its AI-powered...

Privacy & Identity Protection

Why Do I Need a Password Manager?

In today’s digital age, we know the importance of online privacy and security. However, with an increasing number of websites requiring passwords, it becomes tough to remember them all. This is where a password manager comes into play.

McAfee News

McAfee Dominates AV-Comparatives PC Performance Test

In our digital age, a computer is not just a tool; it’s a gateway to a world of possibilities, entertainment,...

McAfee Labs

The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen

Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with...

Internet Security How To Guides and Tutorials

How to Remove Personal Information From Data Broker Sites

Data brokers are companies that collect your information from a variety of sources to sell or license it out to...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Dating Scams

For years now, the popularity of online dating has been on the rise—and so have the number of online romance...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top