Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security Privacy & Identity Protection

What is a Potentially Unwanted Program (PUP)?

Whether you’re an animal person or not, you have to admit that puppies are pretty darn cute. So cute that...

Internet Security Privacy & Identity Protection

What is a Remote Administration Tool (RAT)?

Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I...

Internet Security Privacy & Identity Protection

What is a Rootkit?

A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit...

Internet Security Family Safety Privacy & Identity Protection

What Is a Trojan Horse?

One of history’s great literary classics is Homer’s Iliad, which tells the story of the Trojan horse—the wooden horse that...

How To Guides and Tutorials

What Is a Trojan?

You may vaguely remember reading Virgil’s epic poem “Aeneid” back when you were in school. The story of Odysseus and...

Internet Security Privacy & Identity Protection

What is a Virus?

Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses,...

Internet Security Privacy & Identity Protection

What is a VPN and Can it Hide My IP Address?

There’s a lot of misinformation about Virtual Private Networks, what they do, and the security benefits they offer. For this article, I’d like to do...

Internet Security

What is a Zero-Day Threat?

“Zero-day threat.” It may sound like the title of a hit film, yet it’s anything but.   It’s a previously unknown...

How To Guides and Tutorials

What Is Adware? A Definitive Guide

We live in a digital world and a lot of our daily activities are online, including banking, grocery shopping, and...

Internet Security

What is an AI PC?

As technology rapidly advances, the boundaries of what’s possible in personal computing are continuously expanding. One of the most exciting...

Internet Security

What is Antivirus and What Does It Really Protect?

Authored by Dennis Pang What is antivirus? That’s a good question. What does it really protect? That’s an even better...

Internet Security

What is Artificial Intelligence?

At the beginning of the year, the Associated Press described artificial intelligence (AI) as “easily the biggest buzzword for world...

How To Guides and Tutorials Privacy & Identity Protection

What is ATM Skimming?

Ever take a look at an ATM and feel like something’s off? You might have come across an ATM skimmer....

Internet Security How To Guides and Tutorials

What Is Bloatware and How Can It Impact Security?

The joy of purchasing a new device is liberating. Now you can work, learn, and play faster — along with...

Internet Security Privacy & Identity Protection

What is Browser Hijacking?

Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed  or check out The...

Internet Security How To Guides and Tutorials

What Is Credential Phishing?

You guard the keys to your home closely, right? They have their own special spot in your bag or in...

Privacy & Identity Protection

What is Criminal Identity Theft?

Identity theft gets all kinds of buzz in the news. It’s not hard to see why—in 2012, over 16.6 million...

Internet Security Privacy & Identity Protection

What is disk cleanup and does it remove viruses?

What is Disk Cleanup and does it remove viruses? It happens. You’re in the middle of a computing task, and...

How To Guides and Tutorials

What is Doxing?

Imagine someone putting your personal information out online for thousands of strangers to see—your home address, phone number, even details...

Internet Security Family Safety

What is Encryption?

Encryption is the science of encoding and decoding secret messages.  It began as cryptography—the ancient Greeks used it to protect...

Privacy & Identity Protection

What Is Generative AI and How Does It Work?

It’s all anyone can talk about. In classrooms, boardrooms, on the nightly news, and around the dinner table, artificial intelligence...

Internet Security Privacy & Identity Protection

What is GPS spoofing?

Global positioning system (GPS) technology is now the standard way for travelers to efficiently get from point A to point...

How To Guides and Tutorials

What Is Identity Theft and How Do You Recover From It?

The internet is a big place. While it’s changed the world for the better — making our daily lives that...

How To Guides and Tutorials

What Is Incognito Mode and How Safe Is It?

The internet makes it easy to get a lot done, but not all of it needs to be public. That’s...

Internet Security How To Guides and Tutorials

What Is Internet Security?

Internet security is a broad term that refers to a wide range of tactics that aim to protect activities conducted...

Internet Security Privacy & Identity Protection

What Is Machine Learning?

What do self-driving cars and interactive speakers have in common? Both utilize something called “machine learning.” This is when we...

How To Guides and Tutorials

What Is Malvertising and How Do You Avoid It?

Smartphones and personal computers have enhanced our lives in so many ways that it can be hard to even imagine...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top