Privacy & Identity Protection

Identity theft has evolved far beyond just credit card fraud and unfortunately is a rapidly growing crime. McAfee Identity Protection blogs cover preventative measures related to scams, phishing, and ransomware. Read the latest blogs for tips to protect your identity and privacy.

Protecting Your Privacy on Social Media
Social media sites are made for sharing, so protecting your privacy sometimes comes as an afterthought. But,...
How Using A VPN Could Save Your Summer
As summer inches closer, I begin to daydream about all the trips I’ll get to take with...
How a Young Cybersecurity Researcher Stopped WannaCry Ransomware in Its Tracks
Last Friday, the biggest ransomware attack we’ve seen hit organizations everywhere, impacting more than 150 countries. It...
Don’t Let Cybercriminals Give You the Wedding Bell Blues
It’s springtime, which means flowers are blooming, the sun is shining, and wedding season is starting. Back...
Is Your Password a Priority? Top Takeaways From Our World Password Survey
Whether you’re signing up for a new video-streaming service, logging back into your email, or checking your...
Are Embedded OEM Device Manufacturers Responsible for Device Security?
The blog was written by Tom Moore. Threats against the Industries Today’s devices are becoming more internet-connected...
So, Your Phone Got Stolen. Here’s What to Do.
The Coachella Music and Arts Festival is known for 3 days of desert heat, trendy tunes, and...
Firewalls: Still Your First Line of Defense
The term “firewall” has been used since early computing days to describe a kind of electronic bouncer...
Report Finds Some Health Apps Aren’t Healthy for Your Privacy
One of the big features in today’s Internet-of-Things-centric world is the ability to effortlessly track and record...
Are Connected Homes Mirai’s New Best Friend?
Whenever someone wonders why a strong password is so important, there’s one thing you can remind them...
A Quick Guide to ‘Zero-Day Threats’ and How They Affect You
If you’re looking for a cybersecurity term that sounds intimidating and impressive to those who aren’t familiar...
Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks
In the late 90s and early 2000s, most web browsers came with small, add-on programs to enhance...
397 - 408 of 594
Back to top