Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

How To Guides and Tutorials Privacy & Identity Protection

How To Bank Safely Online

If you’ve got teens, then no doubt you’ve received the SOS texts. ‘Mum, I need a haircut, can you just...

Family Safety

The Best Way to Stay Safe While Gaming

When my boys were in the thick of their teen years (pre pandemic), bad mouthing their seeming gaming obsession was...

How To Guides and Tutorials Privacy & Identity Protection

How To Improve Your Online Security

With the number of cyber threats and breaches dominating the headlines, it can seem like a Herculean task to cover...

How To Guides and Tutorials Privacy & Identity Protection

How to Close Online Accounts for Savings and Security

How many online accounts do you have? Dozens? Hundreds? You probably have more than you think, and deleting a bunch...

Internet Security

The Future of Technology: AI, Deepfake, & Connected Devices

The dystopian 2020s, ’30s, and ’40s depicted in novels and movies written and produced decades ago blessedly seem very far...

Privacy & Identity Protection

The Dangers of Artificial Intelligence

Over the decades, Hollywood has depicted artificial intelligence (AI) in multiple unsettling ways. In their futuristic settings, the AI begins...

Privacy & Identity Protection

Social Engineering—The Scammer’s Secret Weapon

Social engineering. It’s a con game. And a con game by any other name stings just as badly.  Like any...

Mobile Security Internet Security

3 Reasons to Think Twice About Enabling Location Sharing

Do you remember the days of printing out directions from your desktop? Or the times when passengers were navigation co-pilots...

McAfee Labs

CLOP Ransomware exploits MOVEit software

Authored by: Abhishek Karnik and Oliver Devane You may have heard recently in the news that several organizations, including banks,...

Family Safety

Parent’s Guide: 8 Ways to Help Your Teen Combat Distracted Driving

Read this statement, then read it again: Just five distracted seconds at 55 mph is equivalent to driving the length...

Internet Security

The Price of Cybercrime: Protecting the Business You’ve Built from Hacks and Attacks

Cybercrime has a price. One that more and more business owners find themselves paying.  The costs push well into the...

Internet Security

Blockchain Basics: What’s Blockchain Technology and How Might It Change Our Lives?

What’s blockchain technology? The term gets bandied about often enough, but it doesn’t always get the explanation it deserves.  Understanding...

How To Guides and Tutorials Privacy & Identity Protection

How To Protect Your Digital Estate

While we’re enjoying all the good things in our digital lives—our eBooks, movies, email accounts, social media profiles, eBay stores,...

Mobile Security

What Is Smishing? Here’s How to Spot Fake Texts and Keep Your Info Safe

Your phone buzzes. You hope it’s a reply from last night’s date, but instead you get an entirely different swooping...

How To Guides and Tutorials Family Safety

How to Protect Your Family From AI Scams

AI scams are becoming increasingly common. With the rise of artificial intelligence and technology, fraudulent activity is becoming more sophisticated...

How To Guides and Tutorials Internet Security

How to Protect Your Privacy From Generative AI

With the rise of artificial intelligence (AI) and machine learning, concerns about the privacy of personal data have reached an...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect School Children From Deep Fakes

Deep fakes are a growing concern in the age of digital media and can be extremely dangerous for school children....

Internet Security

Be Mindful of These 3 AI Tricks on World Social Media Day

Happy World Social Media Day! Today’s a day about celebrating the life-long friendships you’ve made thanks to social media. Social...

Mobile Security

iPhone Update — Apply It Now If You Haven’t Already

Apple recently issued an urgent iPhone update, iOS version 16.5.1. If you haven’t updated yet, you should.  Owners of iPads...

Mobile Security

Mobile Spyware: How Hackers Can Turn Your Phone Into a Stalking Machine

Some crooks and shady characters will invade your privacy simply by asking for your permission to snoop—through invasive apps you...

How To Guides and Tutorials

How to Protect Yourself From Tailgating Attacks

Holding the door for someone might open the way to a cyberattack. For anyone who works in a secure building...

Internet Security

Scammers Love Barbie: Fake Videos Promote Bogus Ticket Offers That Steal Personal Info

Turns out, scammers really love Barbie.  As Barbie makes her debut on the big screen, scammers are aiming to cash...

McAfee Labs

Android SpyNote attacks electric and water public utility users in Japan

Authored by Yukihiro Okutomi  McAfee’s Mobile team observed a smishing campaign against Japanese Android users posing as a power and...

Privacy & Identity Protection

Four Ways To Use AI Responsibly

Are you skeptical about mainstream artificial intelligence? Or are you all in on AI and use it all day, every...

McAfee Labs

Scammers Follow the Rebranding of Twitter to X, to Distribute Malware

Authored by: Vallabh Chole and Yerko Grbic On July 23rd, 2023, Elon Musk announced that the social networking site, Twitter...

Privacy & Identity Protection

What is Spyware?

Spyware. If the name sounds creepy and invasive, that’s because it is.  The thought of someone virtually looking over your...

Internet Security

AI in the Wild: Malicious Applications of Mainstream AI Tools

It’s not all funny limericks, bizarre portraits, and hilarious viral skits. ChatGPT, Bard, DALL-E, Craiyon, Voice.ai, and a whole host...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top