Identity Protection

Read the latest blogs for tips on protecting your identity and learn how to identify scams, phishing, and ransomware.

Identity Protection

What is a Rootkit?

A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit would be a burglar breaking into your house. The burglar is dressed all in black, so that his form blends into the darkness. He tiptoes around to hide his sounds ...

Identity Protection

What is ATM Skimming?

Ever hear of a crime called skimming? It may not be as dramatic a crime as assault or Ponzi schemes, but it can cause significant problems to you as your  savings account can be wiped out in a flash. Picture a scrawny nerd tampering with an automated teller machine (ATM)—the ...

Identity Protection Mobile and IoT Security

Should You Use Near-Field Communications?

Have you ever wondered what kind of superpower you’d have? I’ve always wanted to send messages and ideas with my mind to others. My dream can sort of come true with near-field communications (NFC). You’ve might not have heard of NFC, but if you have a smartphone, there’s a good ...

Identity Protection

What is Pharming?

. For a lot of kids today, mash-ups are all the rage—whether it’s combining two videos, two songs, or two words. Mash-ups have even caught on in the tech world. The word pharming is actually a mash-up of the words phishing and farming. Phishing is when a hacker uses an ...

Family Safety Identity Protection

Youth & Social Media

The digital world is here to stay. The youth are growing up with and making internet technologies, such as social networking sites, an integral part of their lives. They want to know; share and be heard. They can connect with people who appeal to them; share views and photos instantly; ...

Identity Protection

What is a Computer Worm?

Worms. Most of us probably think of them as those squirmy invertebrates we dissected as a kid or found on the sidewalk after a storm. You might have used them as bait for fishing (not phishing), to pull a prank or have even eaten them (no judgment). Whether you like ...

Family Safety Identity Protection Mobile and IoT Security

What Is a Trojan Horse?

One of history’s great literary classics is Homer’s Iliad, which tells the story of the Trojan horse—the wooden horse that the Greeks hid in to enter the city of Troy and take it over. Two thousand and some odd years later, hackers use a digital Trojan horse to hide malicious ...

Identity Protection

What is Criminal Identity Theft?

Identity theft gets all kinds of buzz in the news. It’s not hard to see why—in 2012, over 16.6 million Americans were victims of identity theft. What most people don’t know is that identity theft is much more than just stealing your credit card number. In other posts, I discussed ...

Identity Protection

What is Browser Hijacking?

Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed  or check out The Financial Times but your homepage is now some weird search engine you’ve never seen before. Guess what? You’ve been hijacked. Browser hijacking is when your Internet browser (eg. Chrome, FireFox, ...

Family Safety Identity Protection Mobile and IoT Security

What’s Your Click IQ?

The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be to have your data compromised.  But celebrities are not the only ones getting hacked. Cybercriminals aren’t choosy—they’ll send malicious texts, emails, and website links to Jennifer Lawrence and your grandma. And while the ...

Subscribe to McAfee Securing Tomorrow Blogs