Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Internet Security

Holiday Shopping Scams: What to Watch as Black Friday & Cyber Monday Approach

It’s an all-too-familiar trap. You’re scrolling TikTok when an ad for your favorite shoe brand pops up. Black Friday and...

McAfee News

Holiday Shopping 2025: US Fact Sheet 

The holidays are supposed to be about joy and generosity — but this year, they’re also peak season for AI-powered...

Internet Security Privacy & Identity Protection

Essential Tips to Avoid ATM Skimming

In this guide, we will delve into some of the security threats around ATMs, with a focus on skimming, and share tips on protecting your data and money in your bank account.

Privacy & Identity Protection

Celebrate Data Privacy Day by Applying These Best Practices

The National Cyber Security Alliance established Data Privacy Day, an annual awareness event observed every January 28th that encourages you to take control of your personal information and understand your privacy rights online.

Internet Security

Oh what a difference an “o” can make!

As you go online to shop for holiday presents, make your banking payments, or book your holiday travel, you’ll need to be more alert about typing those domain names on the address bars to avoid being a victim of typosquatting.

Internet Security Privacy & Identity Protection Family Safety

Stop Fake Antivirus Popups on Your Mac

In this blog, we’ll take a closer look at how you become a target for these fake antivirus pop-up ads, how to remove them from your device, and some tips to block them moving forward.

Internet Security Privacy & Identity Protection

Verify Secure Wireless Networks to Prevent Identity Theft

Wireless internet is amazing and convenient. Sadly, unsecured, unprotected wireless is everywhere. When a device connects to unprotected Wi-Fi, all the data stored on that device is available to a hacker with the proper sniffing tools. It is, however, possible to protect your Wi-Fi from being hacked.

Security News Internet Security

This Week in Scams: Fake Steaks and Debit Card Porch Pirates

We’re back with a new edition of “This Week in Scams,” a roundup of what’s current and trending in all...

Security News Internet Security Mobile Security Family Safety

The Louvre Used Its Own Name as a Password. Here’s What to Learn From It

If you’ve been watching the news, you’ve probably seen the headlines out of Paris: one of the most audacious heists...

Mobile Security

5 Signs Your Device May be Infected with Malware or a Virus

Malware attacks are at an all-time high. Are your family devices secure? Here are the signs your devices may have been hacked.

How To Guides and Tutorials Internet Security

Ways to Tell if a Website Is Fake

Fake or scam websites are fraudulent sites that look legitimate while secretly attempting to steal your personal information, money, or account access.

Internet Security Privacy & Identity Protection

Does PC Cleaning Improve Performance?

Cleaning up your PC has several advantages, including the speeding up of your system and safeguarding your personal information from potential threats. Besides, the process frees up storage space.

Internet Security Privacy & Identity Protection

How To Tell If Your Smart TV Spying on You

Discover how hackers can spy on you through your smart TV's camera, microphone, and apps. Learn how to disable tracking features like ACR, and essential privacy settings to protect yourself from unauthorized surveillance.

Internet Security

What Are the Risks of Clicking on Malicious Links?

Learn how to spot risky URLs, what to do if you've clicked a phishing link, and essential steps to secure your device and accounts from malware, scams, and identity theft.

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Digital Identity

Protecting yourself from hackers and fraud means safeguarding your digital identity. And that can feel like a significant task, given all the information your digital identity contains. It can be done, though, especially if you think about your identity like a puzzle. We’ll show you how to stay safe by ...

Internet Security

Frankenstein Data: How Data Brokers Stitch Together—and Sell—Your Digital Self

Your digital life is being stitched together—one purchase, one search, one swipe at a time. Data brokers collect and combine...

Internet Security Mobile Security

Vampire Wifi: How Public Wi-Fi Traps Travelers in Cyber Attacks

They’re not hiding in dark alleys—they’re hiding in plain sight. Airports, cafés, hotels, even libraries can harbor dangerous Vampire Wi-Fi...

Internet Security

Ghost Accounts: How Old, Forgotten Logins Put You at Risk for Identity Theft

Remember that website where you bought a T-shirt in 2013? No? Hackers do. And it’s one way they can steal...

Internet Security

This New “Verification” Trick Fools You Into Installing Malware

Cybercriminals are turning to TikTok to spread new scams that promise “free upgrades” or access to premium versions of popular...

Security News Internet Security

AWS Outage Disrupts Major Apps Like Reddit and Snapchat—What Happened and How to Stay Safe

Amazon Web Services (AWS), one of the world’s largest cloud providers, recently experienced a major outage that disrupted popular websites...

Security News Internet Security

Hackers Trick Staff Into Exposing Major Companies’ Salesforce Data–Find Out if You’re Safe

Cybercriminals tricked employees at major global companies into handing over Salesforce access and used that access to steal millions of...

McAfee News

McAfee Wins “Best Use of AI in Cybersecurity” for Scam Detector

We’re proud to share that McAfee has won “Best Use of AI in Cybersecurity” at The 2025 A.I. Awards for...

How To Guides and Tutorials

Best Ways to Check for a Trojan on Your PC

In this guide, we will take a closer look at how you can detect Trojans on your computer, and share ways to detect and remove them.

Internet Security McAfee Labs

Astaroth: Banking Trojan Abusing GitHub for Resilience

by Harshil Patel and Prabudh Chakravorty *EDITOR’S NOTE: Special thank you to the GitHub team for working with us on...

How To Guides and Tutorials Privacy & Identity Protection

How to Remove Your Personal Information From the Internet

Scammers and thieves can get a hold of personal information in several ways, such as through phishing attacks that lure you into handing it over, malware that steals it from your devices, by purchasing your information on dark web marketplaces, or as a result of information leaked in data breaches, ...

McAfee News

McAfee Again Certified as “TOP PRODUCT” by AV-TEST

McAfee Total Protection has once again been named a TOP PRODUCT by the independent test lab AV-TEST, earning perfect scores...

How To Guides and Tutorials Internet Security

How to Delete Your Browser History

Learn how to delete your browsing history across popular browsers and accounts to enhance privacy, improve device performance, and reduce targeted tracking.

Subscribe to McAfee Securing Tomorrow Blogs

Back to top