Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee Labs

The Stealthy Stalker: Remcos RAT

Authored By Sakshi Jaiswal, Anuradha M In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat....

How To Guides and Tutorials

How to Protect Your Data While On-the-Go

Winter travel is filled with excitement—whether you’re heading to a snow-covered ski resort, visiting family for the holidays, or enjoying...

Security News

2024 Data Breaches Wrapped

It’s been a big year for big data breaches. Billions of records on millions of people have been exposed at...

How To Guides and Tutorials Privacy & Identity Protection

How to Detect Signs of Identity Theft

When it comes to identity theft, trust your gut when something doesn’t feel right. Follow up. What you’re seeing could be a problem.   A missing bill or a mysterious charge on...

McAfee Labs

SpyLoan: A Global Threat Exploiting Social Engineering

Authored by: Fernando Ruiz The McAfee mobile research team recently identified a significant global increase of SpyLoan, also known as...

How To Guides and Tutorials Internet Security

How to Protect Your Social Media Passwords with Multi-factor Verification

Two-step verification, two-factor authentication, multi-factor authentication…whatever your social media platform calls it, it’s an excellent way to protect your accounts....

How To Guides and Tutorials Privacy & Identity Protection

How to Protect Your Personal Info

Whether it tags along via a smartphone, laptop, tablet, or wearable, it seems like the internet follows us wherever we...

McAfee Labs

Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation

Authored by: M. Authored by: M, Mohanasundaram and Neil Tyagi In today’s rapidly evolving cyber landscape, malware threats continue to...

How To Guides and Tutorials Internet Security

How to Recognize a Phishing Email

How do you recognize phishing emails and texts? Even as many of the scammers behind them have sophisticated their attacks,...

How To Guides and Tutorials Mobile Security

How to Protect Your Smartphone from SIM Swapping

You consider yourself a responsible person when it comes to taking care of your physical possessions. You’ve never left your wallet in...

McAfee Labs

The Dark Side of Gen AI

There’s no denying that Generative Artificial Intelligence (GenAI) has been one of the most significant technological developments in recent memory,...

Family Safety

How to Be Your Family’s Digital IT Hero for the Holidays

The holiday season often brings a rush of new gadgets—smartphones, tablets, laptops, and smart home devices—into households. One survey revealed...

How To Guides and Tutorials Internet Security

How to Secure Your Digital Wallet

Tapping your phone at the cash register makes for a smooth trip to the store. Far smoother than fumbling for...

How To Guides and Tutorials

How AI Deepfakes and Scams Are Changing the Way We Shop Online

As 89% of Americans plan to shop online during this holiday shopping season, many say they’re more concerned about being...

Privacy & Identity Protection

What is the Dark Web?

The dark web. The name raises all kinds of questions. What is the dark web, really? Where is it? Can...

How To Guides and Tutorials Internet Security Privacy & Identity Protection

How to Protect Yourself from Bank Fraud

More and more transactions occur over the internet rather than at a teller’s window, and nearly every account has a username, password, and PIN associated with it. Whether you use online banking regularly or sparingly, you can protect yourself from being the victim of fraud by following a few straightforward ...

Internet Security Privacy & Identity Protection

What Is a Botnet?

What is a botnet? And what does it have to do with a toaster? We’ll get to that. First, a...

Internet Security

Safeguarding Those Who Served: Cybersecurity Challenges for Veterans

As we honor Veterans Day, it’s crucial to recognize not only the sacrifices made by those who served but also...

Mobile Security

Every Step You Take, Every Call You Make: Is Your Phone Tracking You?

So, what does your phone know about you? Taken all together it knows plenty — sometimes in ways that feel...

Internet Security

Gift Card Scams: The Gift That Keeps on Taking

Gift card scams cost consumers millions each year. Learn the common types of gift card fraud, how scammers trick victims, and tips to protect your money.

Mobile Security

The Top 5 Scariest Mobile Threats

Scary movies are great. Scary mobile threats, not so much.  Ghosts, killer clowns, and the creatures can stir up all...

How To Guides and Tutorials Family Safety

How AI PCs Are Optimizing Productivity Tools for Students

In today’s fast-paced educational environment, productivity is a key determinant of academic success. Enter AI PCs—computers enhanced with artificial intelligence...

Internet Security

How To Survive the Deepfake Election with McAfee’s 2024 Election AI Toolkit

As malicious deepfakes continue to flood our screens with disinformation during this election year, we’ve released our 2024 Election AI...

How To Guides and Tutorials

How to Spot a Deepfake on Social Media

Think you can spot a fake on social media? It’s getting tougher. Particularly as deepfake technology gets far better and...

How To Guides and Tutorials

How to Delete or Deactivate Your Instagram Account

Considering leaving Instagram? Learn how to delete your account permanently or deactivate it temporarily. Take control of your account today.

How To Guides and Tutorials

How to Delete Your Facebook Account

Thinking about deleting your Facebook account? We can show you how. Before we get to that, you might be interested...

How To Guides and Tutorials Internet Security

How to Delete Your TikTok Account

Thinking about deleting your TikTok account? We can show you how. Before we get to that, you might be interested...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top