Privacy & Identity Protection

Identity theft has evolved far beyond just credit card fraud and unfortunately is a rapidly growing crime. McAfee Identity Protection blogs cover preventative measures related to scams, phishing, and ransomware. Read the latest blogs for tips to protect your identity and privacy.

Why Do I Need a Password Manager?
In today’s digital age, we know the importance of online privacy and security. However, with an increasing...
How to Spot Dating Scams
For years now, the popularity of online dating has been on the rise—and so have the number...
How to Steer Clear of Tax Season Scams
It's that time of year again – tax season! Whether you've already filed in the hopes of an early refund...
Watch Out For IRS Scams and Avoid Identity Theft
It’s time to get those tax forms ready. But as users prepare to file, scammers prepare to take advantage of...
Quizzes and Other Identity Theft Schemes to Avoid on Social Media
Before you take the fun-looking quiz that popped up in your social media feed, think twice. The...
How to Protect Your Financial Data During Tax Season
W-2 phishing scams often involve emails that appear to be from the IRS or another official source,...
How To Tell The Difference Between Identity Fraud and Identity Theft?
What’s the difference between identity fraud and identity theft? Well, it’s subtle, so much so that it’s...
How to Detect Signs of Identity Theft
When it comes to identity theft, if something doesn’t feel right, trust your gut. Follow up. What...
Can Thieves Steal Identities With Only a Name and Address?
Can thieves steal identities with only a name and address? In short, the answer is “no.” However,...
How to Spot, and Prevent, the Tax Scams That Target Elders
How to Spot, and Prevent, the Tax Scams That Target Elders Elder scams cost seniors in the...
How to Stay Safe When Paying Your Taxes to the IRS
Who else loves tax season besides accountants? Scammers.  It’s high time of year for online risks here...
The What, Why, and How of AI and Threat Detection
The nature of online threats is ever-changing, making it difficult for antiquated threat detection systems to monitor...
13 - 24 of 592
Back to top