Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Mobile Security Internet Security

3 Reasons to Think Twice About Enabling Location Sharing

Do you remember the days of printing out directions from your desktop? Or the times when passengers were navigation co-pilots...

Privacy & Identity Protection

Social Engineering—The Scammer’s Secret Weapon

Social engineering. It’s a con game. And a con game by any other name stings just as badly.  Like any...

Privacy & Identity Protection

The Dangers of Artificial Intelligence

Over the decades, Hollywood has depicted artificial intelligence (AI) in multiple unsettling ways. In their futuristic settings, the AI begins...

Internet Security

The Future of Technology: AI, Deepfake, & Connected Devices

The dystopian 2020s, ’30s, and ’40s depicted in novels and movies written and produced decades ago blessedly seem very far...

How To Guides and Tutorials Privacy & Identity Protection

How to Close Online Accounts for Savings and Security

How many online accounts do you have? Dozens? Hundreds? You probably have more than you think, and deleting a bunch...

How To Guides and Tutorials Privacy & Identity Protection

How To Improve Your Online Security

With the number of cyber threats and breaches dominating the headlines, it can seem like a Herculean task to cover...

Family Safety

The Best Way to Stay Safe While Gaming

When my boys were in the thick of their teen years (pre pandemic), bad mouthing their seeming gaming obsession was...

How To Guides and Tutorials Privacy & Identity Protection

How To Bank Safely Online

If you’ve got teens, then no doubt you’ve received the SOS texts. ‘Mum, I need a haircut, can you just...

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Identity Before You Leave on Vacation

Your summer vacation is approaching quickly! You can’t wait to take time away from your responsibilities, jump out of your...

Internet Security

Anyone Can Try ChatGPT for Free—Don’t Fall for Sketchy Apps That Charge You

Anyone can try ChatGPT for free. Yet that hasn’t stopped scammers from trying to cash in on it.   A rash...

Privacy & Identity Protection

Three Reasons You Need a VPN

You know what a VPN is, but the question remains—why do you need a VPN?  There’s one good reason. Your...

Privacy & Identity Protection

Make Your Smart Home a Secure Home Too: Securing Your IoT Smart Home Devices

It’s only a smart lightbulb. Why would anyone want to hack that?  Great question. Because it gets to the heart...

Privacy & Identity Protection

Why Are Some Countries Banning TikTok?

Waiting in the checkout line. Waiting to fall asleep. Waiting for your boring work call to finally end.  When you...

Mobile Security

Mobile Spyware—How You Can Keep Stalkers Off Your Phone

When you wind up with mobile spyware, you may wind up with a stalker on your phone.  In its most...

Mobile Security Family Safety

Instagram Safety for Kids: Protecting Privacy and Avoiding Risks

If you’re a parent of a teen, there’s a good chance that Instagram is the culprit behind a good chunk...

Internet Security

Steer Clear of Rip-offs: Top Tips for Safer Online Shopping

Everyone loves a great deal when they shop online. Until they discover it’s a rip-off.  Social media ads for vintage...

Privacy & Identity Protection

Artificial Imposters—Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam

Three seconds of audio is all it takes.   Cybercriminals have taken up newly forged artificial intelligence (AI) voice cloning tools...

Mobile Security

“Where Did I Leave My Phone?” Protecting Your Phone from Loss and Theft

Maybe you know that sinking feeling all too well. “Where did I leave my phone?”  The minutes pass as you...

Family Safety

Is My Child Being Cyberbullied Or Is It Just Banter?

If you were to ask me what I consider to be the most attractive attribute in a person, it would...

Internet Security

Independent Lab Tests Show that McAfee Stops Malware Dead in Its Tracks

Concerned about ransomware? McAfee stops it dead in its tracks.  Newly published findings from the independent labs at AV-TEST show...

How To Guides and Tutorials Privacy & Identity Protection

How to Avoid Phishing Attacks on Your Smartphones and Computers

Ping, it’s a scammer!  The sound of an incoming email, text, or direct message has a way of getting your...

How To Guides and Tutorials Family Safety

How to Protect Your Family’s Privacy on Twitter: A Guide for Parents and Kids

It’s no secret that when it comes to social networks, teen preferences can change dramatically from year to year. That...

McAfee Labs

GULoader Campaigns: A Deep Dive Analysis of a highly evasive Shellcode based loader

Authored by: Anandeshwar Unnikrishnan Stage 1: GULoader Shellcode Deployment  In recent GULoader campaigns, we are seeing a rise in NSIS-based...

How To Guides and Tutorials Privacy & Identity Protection

How Senior Adults Can Safeguard Their Privacy

Smart speakers. Banking online. Location tracking. If you are a senior adult, there’s no doubt, the digital leaps and bounds...

McAfee Labs

New Wave of SHTML Phishing Attacks

Authored By Anuradha McAfee Labs has recently observed a new wave of phishing attacks. In this wave, the attacker has...

McAfee Labs

Deconstructing Amadey’s Latest Multi-Stage Attack and Malware Distribution

Authored by By Yashvi Shah  McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at...

How To Guides and Tutorials Mobile Security Family Safety

How To Be Safe On WhatsApp

I’m betting you have WhatsApp on your phone. Or, if you don’t – I’m quite sure a member of your...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top