Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security How To Guides and Tutorials

How to Spot AI Audio Deepfakes at Election Time

We’ve said it several times in our blogs — it’s tough knowing what’s real and what’s fake out there. And...

How To Guides and Tutorials

How To Teach Your Kids About Deepfakes

Is it real? Is it fake?  Deepfake technology has certainly made everything far more complicated online. How do you know...

McAfee Labs

Redline Stealer: A Novel Approach

Authored by Mohansundaram M and Neil Tyagi A new packed variant of the Redline Stealer trojan was observed in the...

Internet Security How To Guides and Tutorials

How to Protect Yourself Against AI Voice Cloning Attacks

Imagine receiving a call from a loved one, only to discover it’s not them but a convincing replica created by...

Internet Security How To Guides and Tutorials

How Do You Manage Your Social Media Privacy?

‘Ensure your privacy settings are set to the highest level’ – if you’ve been reading my posts for a bit...

How To Guides and Tutorials

How to Protect Your Streaming Accounts: Lessons from Roku’s Data Leak

In recent news, Roku, a leading streaming platform, reported that over 591,000 user accounts were affected by credential stuffing attacks....

Internet Security How To Guides and Tutorials

How to Protect Yourself From Social Media Harassment

Some conversations on social media can get … heated. Some can cross the line into harassment. Or worse.  Harassment on...

Internet Security

A Finance Journalist Fell Victim to a $50K Vishing Scam – Are You Also at Risk?

In a world where digital communication dominates, the art of scamming has evolved into a sophisticated game of deception. A...

Internet Security

Stay Cyber Savvy: Your 5-Step Guide to Outsmarting Phishing Scams

In today’s digital landscape, distinguishing between legitimate communications and phishing attempts can feel like navigating a labyrinth blindfolded. Phishing is...

Internet Security

The Top Tax Scams of 2024

While last-minute tax filers stare down the clock, scammers look for easy pickings. Tax scams are in full swing as...

How To Guides and Tutorials Privacy & Identity Protection

How to Steer Clear of Tax Season Scams

It’s that time of year again – tax season! Whether you’ve already filed in the hopes of an early refund...

How To Guides and Tutorials Mobile Security

How to Protect Against New Types of Scams Like QR Phishing

Four in ten Americans say they use peer-to-peer payment services, like Venmo, PayPal, or Apple Pay, at least once a...

Internet Security How To Guides and Tutorials

How to Avoid Solar Eclipse Scams

Scammers are turning a buck on the eclipse. A rash of eclipse scams have appeared online, many involving the sale...

Mobile Security

The Four Rs of Personal Mobile Security

Smartphones have enabled a whole new digital world, where apps are gateways to just about any service imaginable. However, like...

McAfee Labs

Distinctive Campaign Evolution of Pikabot Malware

Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early 2023. Its modular...

How To Guides and Tutorials

Are You a Victim of a Deepfake Attack? Here’s What to Do Next

With the rise of cheap and easy-to-use AI tools, deepfake attacks find themselves likewise on the rise. Startling as that...

Family Safety

Teen Slang – What You Need To Know To Understand Your Teen

Got any ‘rizz’? Did you ‘slay’ that dinner? Is the ‘cozzie livs’ stressing you out?  If you do not comprehendo,...

Mobile Security

Avoid Making Costly Mistakes with Your Mobile Payment Apps

There used to be a time when one roommate split the cost of rent with another by writing a check. Who still owns a checkbook these days? Of...

Privacy & Identity Protection

Quizzes and Other Identity Theft Schemes to Avoid on Social Media

Before you take the fun-looking quiz that popped up in your social media feed, think twice. The person holding the answers may be a hacker.  Where...

How To Guides and Tutorials Mobile Security

Why You Need a VPN on Your Smartphone

Using a VPN on your smartphone can boost your privacy in a big way, particularly with all the data tracking...

How To Guides and Tutorials Privacy & Identity Protection

How To Tell The Difference Between Identity Fraud and Identity Theft?

What’s the difference between identity fraud and identity theft? Well, it’s subtle, so much so that it’s easy to use...

Privacy & Identity Protection

Can Thieves Steal Identities With Only a Name and Address?

Can thieves steal identities with only a name and address?   In short, the answer is “no.” Which is a good...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot, and Prevent, the Tax Scams That Target Elders

How to Spot, and Prevent, the Tax Scams That Target Elders Elder scams cost seniors in the U.S. some $3...

How To Guides and Tutorials Mobile Security

How to Tell If Your Text Message Is Real 

Text message scams are surging, costing consumers more money and time than ever before.   According to McAfee’s latest State of...

McAfee Labs

Android Phishing Scam Using Malware-as-a-Service on the Rise in India

Authored by ZePeng Chen and Wenfeng Yu  McAfee Mobile Research Team has observed an active scam malware campaign targeting Android...

How To Guides and Tutorials Mobile Security

7 Tips to Protect Your Smartphone from Getting Hacked

There’s little rest for your hard-working smartphone. If you’re like many professionals today, you use it for work, play, and a mix of personal...

Internet Security

5 Things About Doxing You Should Know

Doxing can be harmful to one’s reputation and can cost someone their job, their friends, or their privacy. Here are five things you should know about doxing, plus some tips on how to prevent it from happening to you.

Subscribe to McAfee Securing Tomorrow Blogs

Back to top