Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

How To Guides and Tutorials

Are You a Victim of a Deepfake Attack? Here’s What to Do Next

With the rise of cheap and easy-to-use AI tools, deepfake attacks find themselves likewise on the rise. Startling as that...

McAfee Labs

Distinctive Campaign Evolution of Pikabot Malware

Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early 2023. Its modular...

Mobile Security

The Four Rs of Personal Mobile Security

Smartphones have enabled a whole new digital world, where apps are gateways to just about any service imaginable. However, like...

How To Guides and Tutorials Internet Security

How to Avoid Solar Eclipse Scams

Scammers are turning a buck on the eclipse. A rash of eclipse scams have appeared online, many involving the sale...

How To Guides and Tutorials Mobile Security

How to Protect Against New Types of Scams Like QR Phishing

Four in ten Americans say they use peer-to-peer payment services, like Venmo, PayPal, or Apple Pay, at least once a...

How To Guides and Tutorials Privacy & Identity Protection

How to Steer Clear of Tax Season Scams

It’s that time of year again – tax season! Whether you’ve already filed in the hopes of an early refund...

Internet Security

The Top Tax Scams of 2024

While last-minute tax filers stare down the clock, scammers look for easy pickings. Tax scams are in full swing as...

Internet Security

Stay Cyber Savvy: Your 5-Step Guide to Outsmarting Phishing Scams

In today’s digital landscape, distinguishing between legitimate communications and phishing attempts can feel like navigating a labyrinth blindfolded. Phishing is...

Internet Security

A Finance Journalist Fell Victim to a $50K Vishing Scam – Are You Also at Risk?

In a world where digital communication dominates, the art of scamming has evolved into a sophisticated game of deception. A...

How To Guides and Tutorials Internet Security

How to Protect Yourself From Social Media Harassment

Some conversations on social media can get … heated. Some can cross the line into harassment. Or worse.  Harassment on...

How To Guides and Tutorials

How to Protect Your Streaming Accounts: Lessons from Roku’s Data Leak

In recent news, Roku, a leading streaming platform, reported that over 591,000 user accounts were affected by credential stuffing attacks....

How To Guides and Tutorials Internet Security

How Do You Manage Your Social Media Privacy?

‘Ensure your privacy settings are set to the highest level’ – if you’ve been reading my posts for a bit...

How To Guides and Tutorials Internet Security

How to Protect Yourself Against AI Voice Cloning Attacks

Imagine receiving a call from a loved one, only to discover it’s not them but a convincing replica created by...

McAfee Labs

Redline Stealer: A Novel Approach

Authored by Mohansundaram M and Neil Tyagi A new packed variant of the Redline Stealer trojan was observed in the...

How To Guides and Tutorials

How To Teach Your Kids About Deepfakes

Is it real? Is it fake?  Deepfake technology has certainly made everything far more complicated online. How do you know...

How To Guides and Tutorials Internet Security

How to Spot AI Audio Deepfakes at Election Time

We’ve said it several times in our blogs — it’s tough knowing what’s real and what’s fake out there. And...

How To Guides and Tutorials Privacy & Identity Protection

How to Spot Dating Scams

For years now, the popularity of online dating has been on the rise—and so have the number of online romance...

How To Guides and Tutorials Internet Security

How to Remove Personal Information From Data Broker Sites

Data brokers are companies that collect your information from a variety of sources to sell or license it out to...

McAfee Labs

The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen

Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with...

McAfee News

McAfee Dominates AV-Comparatives PC Performance Test

In our digital age, a computer is not just a tool; it’s a gateway to a world of possibilities, entertainment,...

Privacy & Identity Protection

Why Do I Need a Password Manager?

In today’s digital age, we know the importance of online privacy and security. However, with an increasing number of websites requiring passwords, it becomes tough to remember them all. This is where a password manager comes into play.

Internet Security

McAfee and Intel Collaborate to Combat Deepfakes with AI-Powered Deepfake Detection

In a world where deepfake scams and misinformation are on the rise, McAfee has announced significant enhancements to its AI-powered...

How To Guides and Tutorials Privacy & Identity Protection

How to Report Identity Theft to Social Security

In the hands of a thief, your Social Security Number is the master key to your identity.  With a Social Security Number (SSN), a thief can...

McAfee Labs

From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats

Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as “Asynchronous Remote Access Trojan,” represents a highly sophisticated malware...

How To Guides and Tutorials

How to Protect Your Internet-Connected Healthcare Devices

Fitness trackers worn on the wrist, glucose monitors that test blood sugar without a prick, and connected toothbrushes that let...

How To Guides and Tutorials Mobile Security Family Safety

How Do Hackers Hack Phones and How Can I Prevent It?

The threat of having your phone hacked has become a common fear. The truth is that it is possible to hack any phone. With the advancement of technology, where discovery of knowledge and information advances the understanding of technology, hackers are able to hack even the most sophisticated phone software. ...

McAfee Labs

How Scammers Hijack Your Instagram

Authored by Vignesh Dhatchanamoorthy, Rachana S Instagram, with its vast user base and dynamic platform, has become a hotbed for...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top