Privacy & Identity Protection

Identity theft has evolved far beyond just credit card fraud and unfortunately is a rapidly growing crime. McAfee Identity Protection blogs cover preventative measures related to scams, phishing, and ransomware. Read the latest blogs for tips to protect your identity and privacy.

Could a Streaming Device Help Hackers Hijack Your TV?
Streaming devices make dumb TVs smart and smart TVs, well, smarter. But as loyal “Hackable?” listeners know,...
Hack-ception: Benign Hacker Rescues 26M Stolen Credit Card Records
There's something ironic about cybercriminals getting "hacked back." BriansClub, one of the largest underground stores for buying stolen credit card...
15 Easy, Effective Ways to Start Winning Back Your Online Privacy
Is it possible to get back some of the data we've lost in cyberspace over the years? Sure, but it...
Watch Your Step: Insights on the TOMS Shoes Mailing Hack
You’re familiar with the cybercriminals that go after users’ credit card information and look to spread malicious links, but recently,...
Hackable?” Tests Whether Car Key Fobs Are Secure
Smart key fobs make it easy to open your car, pop the trunk, and start driving without...
Stay Smart Online Week 2019
Let’s Reverse the Threat of Identity Theft!! Our online identities are critical. In fact, you could argue...
Chapter Preview: Birth to Age 2 – First Footprints
When your baby is on the way, their privacy and digital security is probably the last thing you have on...
“Hackable?” Puts Wireless Mice to the Test
Wireless mice have become the preferred peripheral to scroll and click, and for most users, all they...
Is Your Medical Data Safe? 16 Million Medical Scans Left Out in the Open
Have you ever needed to get an X-ray or an MRI for an injury? It turns out that these images,...
Chapter Preview: It All Starts with Your Personal Data Lake
Once, not long ago, data was nestled in paper files or stored on isolated computer networks, housed in glassed-off, air-conditioned...
Solving the Gamer’s Dilemma: Security vs. Performance
The gamer’s dilemma – security vs. performance – is why gamers put security second, even as the average gamer experiences five cyberattacks.
Millions of Car Buyer Records Exposed: How to Bring This Breach to a Halt
Buying a car can be quite a process and requires a lot of time, energy, and research. What most potential...
229 - 240 of 592
Back to top