Blog Archives

LinkedIN Twitter
We're here to make life online safe and enjoyable for everyone.

Articles by Author

Mobile Security
How Do Hackers Hack Phones and How Can I Prevent It?
The threat of having your phone hacked has become a common fear. The truth is that it...
Security News
The Optus Data Breach – Steps You Can Take to Protect Yourself
Optus, one of Australia’s largest telecommunications carriers, reported news of a data breach that may have compromised...
Tips & Tricks
How Often Should You Change Your Passwords?
When it comes to passwords, most of us would love nothing more than to set it and...
Tips & Tricks
Watch Out for These 3 Online Job Scams
Here are three common job scams employment seekers may encounter: immigration scams, fake job ads, and phishing...
Tips & Tricks
Protect Your Social Media Accounts from Hacks and Attacks
Social Media Day is a good day to give your social media settings and habits a closer...
Privacy & Identity Protection
Strong Password Ideas to Keep Your Information Safe
By creating a unique password, you are both proving your identity and keeping your personal information safer....
Internet Security
What Is Synthetic Identity Theft?
Synthetic identity theft occurs when a cybercriminal steals a real Social Security Number (SSN) but fabricates the...
Mobile Security
Smartphone Alternatives: Ease Your Way into Your Child’s First Phone
Many parents may not feel ready to give their pre-teen or tween their first smartphone, yet they...
Internet Security
Here’s How to Steer Clear of Bot Accounts on Social Media
“Congratulations, you’re a winner!”  “Did you know this public figure is trying to make your life worse?...
Tips & Tricks
How to Remove Personal Information From Data Broker Sites
Data brokers are companies that collect your information from a variety of sources to sell or license...
Mobile Security
7 Signs Your Phone Has a Virus and What You Can Do
Our phones store a lot of personal data, including contacts, social media account details, and bank account...
Internet Security
Encrypted Messaging Service Hack Exposes Phone Numbers
Many people opt for encrypted messaging services because they like the additional layers of privacy they offer....
1 - 12 of 1525

Stay Updated

Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats.

Back to top