840 matching results for "data privacy"

FILTER BY:
SORT BY:
Privacy & Identity Protection
Celebrate Data Privacy Day by Applying These Best Practices
The National Cyber Security Alliance established Data Privacy Day, an annual awareness event observed every January 28th...
Internet Security
Oh what a difference an “o” can make!
As you go online to shop for holiday presents, make your banking payments, or book your holiday...
Family Safety
Stop Fake Antivirus Popups on Your Mac
In this blog, we’ll take a closer look at how you become a target for these fake...
Privacy & Identity Protection
Verify Secure Wireless Networks to Prevent Identity Theft
Wireless internet is amazing and convenient. Sadly, unsecured, unprotected wireless is everywhere. When a device connects to...
Mobile Security
5 Signs Your Device May be Infected with Malware or a Virus
Malware attacks are at an all-time high. Are your family devices secure? Here are the signs your...
How To Guides and Tutorials
Ways to Tell if a Website Is Fake
Fake or scam websites are fraudulent sites that look legitimate while secretly attempting to steal your personal...
Internet Security
Does PC Cleaning Improve Performance?
Cleaning up your PC has several advantages, including the speeding up of your system and safeguarding your...
Internet Security
How To Tell If Your Smart TV Spying on You
Discover how hackers can spy on you through your smart TV's camera, microphone, and apps. Learn how...
Internet Security
What Are the Risks of Clicking on Malicious Links?
Learn how to spot risky URLs, what to do if you've clicked a phishing link, and essential...
Privacy & Identity Protection
How to Protect Your Digital Identity
Protecting yourself from hackers and fraud means protecting your digital identity. And that can feel like a...
Privacy & Identity Protection
Frankenstein Data: How Data Brokers Stitch Together—and Sell—Your Digital Self
Your digital life is being stitched together—one purchase, one search, one swipe at a time. Data brokers...
Internet Security
Vampire Wifi: How Public Wi-Fi Traps Travelers in Cyber Attacks
They’re not hiding in dark alleys—they’re hiding in plain sight. Airports, cafés, hotels, even libraries can harbor...
25 - 36 of 840

Stay Updated

Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats.

FacebookTwitterInstagramLinkedINYouTubeRSS
Back to top