Featured Blogs
The Most Impersonated Brands in Holiday Shopping, Ranked
Scammers aren’t worried about ending up on the naughty list. If anything, they’re doubling down in 2025. This year, scammers are impersonating major brands with startling accuracy,...
This Week in Scams: DoorDash Breach and Fake Flight Cancellation Texts
Leading off our news on scams this week, a heads-up for DoorDash users, merchants, and Dashers too. A data breach...
Learn to Identify and Avoid Malicious Browser Extensions
Browser extensions have become essential parts of how we browse, bank, work, and shop online. From password managers to ad...
How to Follow McAfee on Google News in One Simple Step
Want McAfee’s latest scam alerts, cybersecurity tips, and safety updates to show up automatically in your Google News feed? You...
Guard Your Android Phones Against Loss of Data and Infected Apps
Because Android uses an open source operating system, it usually gets a bad rap for being vulnerable to data loss...
Ghost Tapping: What It Is, How It Works, and How to Stay Safe
Contactless payments make everyday purchases fast and easy. Yet with that convenience comes a risk: ghost tapping. In crowded spaces...
App Locks Can Improve the Security of Your Mobile Phones
The practice of locking our possessions is relevant in every aspect of our modern lives. We physically lock our houses,...
Venmo 101: Making Safer Payments with the App
As the holiday season ramps up, so do group dinners, shared travel costs, gift exchanges, and all the little moments...
What Does It Take To Be Digitally Secure?
It’s no longer possible to deny that your life in the physical world and your digital life are one and...
Hack the Vote: Pros and Cons of Electronic Voting
Every four years, scores of American people flood churches, schools, homes, and auditoriums to cast their ballots for the future...
