Featured Blogs
Stay Cyber Savvy: Your 5-Step Guide to Outsmarting Phishing Scams
In today’s digital landscape, distinguishing between legitimate communications and phishing attempts can feel like navigating a labyrinth blindfolded. Phishing is...
The Top Tax Scams of 2024
While last-minute tax filers stare down the clock, scammers look for easy pickings. Tax scams are in full swing as...
How to Steer Clear of Tax Season Scams
It’s that time of year again – tax season! Whether you’ve already filed in the hopes of an early refund...
How to Protect Against New Types of Scams Like QR Phishing
Four in ten Americans say they use peer-to-peer payment services, like Venmo, PayPal, or Apple Pay, at least once a...
How to Avoid Solar Eclipse Scams
Scammers are turning a buck on the eclipse. A rash of eclipse scams have appeared online, many involving the sale...
The Four Rs of Personal Mobile Security
Smartphones have enabled a whole new digital world, where apps are gateways to just about any service imaginable. However, like...
Distinctive Campaign Evolution of Pikabot Malware
Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early 2023. Its modular...
Are You a Victim of a Deepfake Attack? Here’s What to Do Next
With the rise of cheap and easy-to-use AI tools, deepfake attacks find themselves likewise on the rise. Startling as that...
Teen Slang – What You Need To Know To Understand Your Teen
Got any ‘rizz’? Did you ‘slay’ that dinner? Is the ‘cozzie livs’ stressing you out? If you do not comprehendo,...
Avoid Making Costly Mistakes with Your Mobile Payment Apps
There used to be a time when one roommate split the cost of rent with another by writing a check. Who still owns a checkbook these days? Of...
Quizzes and Other Identity Theft Schemes to Avoid on Social Media
Before you take the fun-looking quiz that popped up in your social media feed, think twice. The person holding the answers may be a hacker. Where...
Why You Need a VPN on Your Smartphone
Using a VPN on your smartphone can boost your privacy in a big way, particularly with all the data tracking...
How To Tell The Difference Between Identity Fraud and Identity Theft?
What’s the difference between identity fraud and identity theft? Well, it’s subtle, so much so that it’s easy to use...
Can Thieves Steal Identities With Only a Name and Address?
Can thieves steal identities with only a name and address? In short, the answer is “no.” Which is a good...
How to Spot, and Prevent, the Tax Scams That Target Elders
How to Spot, and Prevent, the Tax Scams That Target Elders Elder scams cost seniors in the U.S. some $3...
How to Tell If Your Text Message Is Real
Text message scams are surging, costing consumers more money and time than ever before. According to McAfee’s latest State of...
Android Phishing Scam Using Malware-as-a-Service on the Rise in India
Authored by ZePeng Chen and Wenfeng Yu McAfee Mobile Research Team has observed an active scam malware campaign targeting Android...
7 Tips to Protect Your Smartphone from Getting Hacked
There’s little rest for your hard-working smartphone. If you’re like many professionals today, you use it for work, play, and a mix of personal...
5 Things About Doxing You Should Know
Doxing can be harmful to one’s reputation and can cost someone their job, their friends, or their privacy. Here are five things you should know about doxing, plus some tips on how to prevent it from happening to you.
15,000+ Roku Accounts Compromised — Take These Steps to Protect Yourself
Hackers used one of the oldest tricks in the book to turn a buck. All at the expense of several...
Scam or Not? How to Tell Whether Your Text Message Is Real
According to reports from the Federal Trade Commission’s Consumer Sentinel database, text message scams swindled $330 million from Americans in...
How to Stay Safe When Paying Your Taxes to the IRS
Who else loves tax season besides accountants? Scammers. It’s high time of year for online risks here in the U.S....
What are Pig Butchering Scams and How Do They Work?
“Jessica” cost him one million dollars. In an account to Forbes, one man described how he met “Jessica” online.i Readily,...
How we’re #InspiringInclusion at McAfee for International Women’s Day 2024
International Women’s Day 2024’s theme, #InspireInclusion, reminds us that genuine change requires going beyond individual actions. It’s about fostering an...
The What, Why, and How of AI and Threat Detection
There are more online users now than ever before, thanks to the availability of network-capable devices and online services. The internet...
How to Protect Yourself From Identity Theft After a Data Breach
Did you just get word that your personal information may have been caught up in a data breach? If so,...
How to Identify and Protect Yourself From Venmo Scams and Other Cash App Scams
Venmo, quick and convenient. A great way to pay back a friend or split the cost of a meal. Yet...