Consumer

Get online safety tips and stay up to date on the latest computer security news, like what third-party apps are safe to install.

Family Safety Identity Protection

Most Unwanted Criminals: Phishers, Shoulder Surfers and Keyloggers

McAfee’s most unwanted criminals have included pickpockets, Trojan viruses, and ATM skimmers, dumpster divers, spies, and wireless hackers and now phishers, shoulder surfers, and keyloggers. Identity theft can happen online or on the ground to anyone with a pulse, and even to the deceased. The key is awareness, vigilance, and ...

Family Safety Identity Protection

Lawmakers Push To Shield Last 4 Social Security Numbers

Most of us have become accustomed to giving out the last four digits of our Social Security numbers. But this customary request is becoming increasingly problematic, and two Rhode Island lawmakers are responding by pushing legislation to stop businesses from asking for the last four digits of customers’ Social Security ...

Family Safety Identity Protection

Spyware A Major Identity Theft Threat

Spyware is sold legally in the United States. This software records chats, emails, browsing history, usernames, passwords, and basically everything a person does on that PC. Some spyware programs can record everything in a video file, which can then be accessed remotely. This is all perfectly legal as long as ...

Family Safety Identity Protection

7 Types of Hacker Motivations

There are good and bad hackers. Here is a window into what they do and why: White Hat Hackers: These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure. These IT security professionals rely on ...

Family Safety Identity Protection

Social Security Numbers Easily Cracked

It is easier than ever to guess or predict an individual’s Social Security number, which puts us all at a greater risk for identity theft. Researchers at Carnegie Mellon University have developed a reliable method for predicting Social Security numbers, using information from social networking sites, data brokers, voter registration ...

Identity Protection Mobile and IoT Security

Lost or Stolen Mobile Devices Can Lead to Identity Theft

We lose stuff. You put something down, you get distracted, you forget about it and it’s gone. Stuff falls out of our pockets and bags all the time. I’m one of those people that’s so smart, I’m stupid and absent minded when it comes to my stuff. Where’s my wallet, ...

Family Safety Identity Protection

The 6 Types of Identity Theft

#1 New Account Fraud Using another’s personal identifying information to obtain products and services using that person’s good credit standing.  This fraud often requires use of the victim’s Social Security number. Opening new utility, cell phone and/or credit card accounts are the most prevalent forms of new account fraud. #2 ...

Family Safety Identity Protection

Data Privacy Day

This is a critical time for our personal security as it relates to privacy and personal information. A battle is being waged over our data, and there are several parties involved in this fight. My concern is securing the personal details that you would prefer to keep private. Criminal hackers ...

Family Safety Identity Protection

Hacking Wireless for Identity Theft

The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives. Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels, airports, cars, and even airplanes. The mobility factor allows us to work anytime, anywhere, on numerous devices. “Being ...

Family Safety Identity Protection

IRS Fully Reliant on Social Security Numbers

On the Policy, Practice & Procedures page of their website, the IRS addresses the public’s concern regarding Social Security numbers on checks: “Complete Social Security Numbers (SSN) on Checks or Money Orders Remitted to IRS Issue: Tax Professionals and clients have concerns about taxpayers putting their full SSN on checks ...

Subscribe to McAfee Securing Tomorrow Blogs