635 matching results for "screen time"

How To Guides and Tutorials
Love, Lies, and Long Flights: How to Avoid Romance Scams While Traveling This Summer
Ah, summer. The season of sun-soaked beaches, bucket list adventures, and Instagram-worthy Aperol Spritzes. For many, it’s...
Internet Security
What to Do If You Book a Hotel or Airbnb and It Turns Out to Be a Scam
Summer vacation season is upon us, and millions of families are booking accommodations for their dream getaways....
Family Safety
How To Protect Your Family’s Smartphones While on Vacation
With families hitting the road for vacations once again, smartphones and chargers are coming along for the...
McAfee News
Introducing McAfee’s Scam Detector – Now Included in All Core Plans
In today’s online world, scams are everywhere—and they’re harder to spot than ever. From sophisticated phishing texts...
Internet Security
Brittany’s Scam Story: Eras Tour Chaos
Brittany C., a dedicated teacher, had been planning a special night for months. After saving up steadily,...
Internet Security
Henry’s Scam Story: The Social Media Con
Henry A. had been trying for weeks to score a ticket to see Tyler, the Creator in...
Internet Security
Bradley’s Scam Story: New Dad vs Fake IRS Call
Bradley K. was a brand-new dad, sleep-deprived and juggling life with a newborn, when he received a...
Security News
This Week in Scams: $16.6 Billion Lost, Deepfakes Rise, and Google Email Scams Emerge
Welcome to the first edition of This Week in Scams, a new weekly series from McAfee breaking...
Privacy & Identity Protection
Your Phone Is the #1 Target in a New Wave of IRS Scams, McAfee Finds
As Tax Day looms and last-minute taxpayers feel the pressure, a surge of IRS scams is on...
Privacy & Identity Protection
How to Spot Phishing Emails and Scams
There are plenty of phish in the sea. Millions of bogus phishing emails land in millions of...
McAfee Labs
New Android Malware Campaigns Evading Detection Using Cross-Platform Framework .NET MAUI
Authored by Dexter Shin Summary Cybercriminals are constantly evolving their techniques to bypass security measures. Recently, the...
Mobile Security