Featured Blogs
Introducing McAfee’s Scam Detector – Now Included in All Core Plans
In today’s online world, scams are everywhere—and they’re harder to spot than ever. From sophisticated phishing texts and deepfake videos...
Introducing Scam Stories: A McAfee Campaign to End Scam Stigma
When Grey’s Anatomy actor Chris Carmack and musician Erin Slaver tried to order custom patio cushions from what seemed like...
Keep It Real: How McAfee Is Using AI to Fight AI—and End Scam Stigma
Was that spinning head a mistake—or the whole point? When McAfee dropped a new digital ad showing a woman lounging...
How To Do A Virus Scan
New online threats emerge every day, putting our personal information, money, and devices at risk. In this article, we’ll go through everything you need to know to run a scan effectively to keep your computers, phones and tablets in tip-top shape.
7 Signs Your Phone Has a Virus and What You Can Do
Viruses are a type of malware that replicate themselves and spread throughout the entire system. In this article, we will give you a rundown of viruses that can infect your phone and how you can identify and eliminate them.
Does Windows 10 or 11 Need Antivirus Software?
Should you just use Windows Security — Microsoft’s free version of antivirus software — or buy additional protection? Read on to learn what Microsoft Security covers and how additional virus protection can secure all of your connected devices.
Adidas Data Breach: What Consumers Need to Know and How to Protect Yourself
German sportswear giant Adidas has confirmed a significant cybersecurity incident that compromised customer personal information through an attack on their...
Standing Together Against Scams: McAfee Joins the Global Anti-Scam Alliance
At McAfee, we see the real faces behind the statistics. Our research shows, globally, people spend an average of 83...
How to Protect Your Crypto After the Coinbase Breach
In a significant security incident, Coinbase, a leading cryptocurrency trading platform, recently disclosed a data breach impacting nearly 70,000 users....
How To Protect Your Family’s Smartphones While on Vacation
Summer is synonymous with vacations, a time when families pack their bags, grab their sunscreen, and embark on exciting adventures....
What to Do If You Book a Hotel or Airbnb and It Turns Out to Be a Scam
Summer vacation season is upon us, and millions of families are booking accommodations for their dream getaways. But with the...
Love, Lies, and Long Flights: How to Avoid Romance Scams While Traveling This Summer
Ah, summer. The season of sun-soaked beaches, bucket list adventures, and Instagram-worthy Aperol Spritzes. For many, it’s also a time...
How the Sandwich Generation Can Fight Back Against Scams
The modern family juggling act has never been more complex—or more dangerous. If you’re caring for aging parents while raising...
Navigating cybersecurity challenges in the early days of Agentic AI
As we continue to evolve the field of AI, a new branch that has been accelerating recently is Agentic AI....
16 Billion Stolen Logins for Apple, Google, Facebook and More: How to Stay Safe
Reports last week detail a “16 billion password leak”, with major news outlets worldwide proclaiming this as one of the...
The Kaspersky Software Ban—What You Need to Know to Stay Safe Online
Citing national security concerns, the U.S. Department of Commerce issued an immediate ban on the sale of all antivirus software by Russia-based Kaspersky Lab, Inc. in the United States or to U.S. persons.
How Criminals Are Using AI to Clone Travel Agents and Steal Your Money
Your dream vacation could become a nightmare if you fall for these sophisticated AI-powered scams. The travel industry is experiencing...
Why Public Wi-Fi at Tourist Hotspots is a Goldmine for Hackers
Picture this: You’ve just arrived at a bustling airport, exhausted from your journey but excited for your vacation. While waiting...
How to Know If Your Phone Has Been Hacked
Is your phone performance is off, things crash, and so on? While there are several cases where there’s a legitimate technical issue behind that, it could also be the sign of a hacked device.
How to Shop Safely During Amazon Prime Day
As Amazon Prime Day approaches (July 8-11, 2025), millions of shoppers are gearing up for what promises to be one...
A Guide to Remove Malware From Your iPhone
Do you want to learn how to get rid of malware on your iPhone? Check out our detailed guide!
How to Protect Yourself from Concert and Festival Ticket Scams
Summer festival season is upon us, and music lovers are eagerly anticipating everything from The Weeknd tickets to intimate local...
When AI Voices Target World Leaders: The Growing Threat of AI Voice Scams
If someone called you claiming to be a government official, would you know if their voice was real? This question...
Fake Android Money Transfer App Targeting Bengali-Speaking Users
Authored by Dexter Shin McAfee’s Mobile Research Team discovered a new and active Android malware campaign targeting Bengali-speaking users, mainly...
My email has been hacked! What should I do next?
If you find that your email has been hacked, your immediate reaction is probably wondering what you should do next....
New TikTok App on the Horizon: What US Users Need to Know About the Risks
As reports emerge of a new TikTok app known internally as “M2” specifically designed for US users, McAfee warns that...
How to Delete Yourself from the Internet
Why is it so important to take control of our personal info? Because so much of business, finance, healthcare, and life in general runs on data, your personal info has a dollar value attached to it.