Privacy & Identity Protection

Identity theft has evolved far beyond just credit card fraud and unfortunately is a rapidly growing crime. McAfee Identity Protection blogs cover preventative measures related to scams, phishing, and ransomware. Read the latest blogs for tips to protect your identity and privacy.

Children’s Charity or CryptoMix? Details on This Ransomware Scam
As ransomware threats become more sophisticated, the tactics cybercriminals use to coerce payments from users become more targeted as well.
Meet McAfee WebAdvisor’s New Cryptojacking Blocker
By now, you've probably heard of cryptocurrency, but you may not know exactly what it is. To put it simply,...
Learn Just What a Hacker Can Do With Remote RAT Access
Remote administration tools, or RATs, lurk in phishing emails and malicious downloads across the internet. Once installed,...
Cybercriminals Disguised as Apple Are After Users’ Personal Data
With the holidays rapidly approaching, many consumers are receiving order confirmation emails updating them on their online purchases for friends...
Can Hackers Make Drones Drop out of the Sky?
While Amazon hasn’t begun using autonomous drones to deliver packages (yet), the aerial technology is becoming more...
Are Your Online Photos Sharing More Than You Think?
We all share photos online: photos of our kids, photos of our trips, and photos of our...
Software Company WakeNet AB Discovered Spreading PUPs to Users
Pay-per-install, or PPI for short, is a type of software program that presents users with third-party offers while they are...
Is a Laptop’s Password Enough to Keep it Secure?
It could happen to any of us. One minute your laptop is sitting on a coffeehouse table...
What Your Password Says About You
At the end of last year, a survey revealed that the most popular password was still “123456,” followed by “password.”
Preventing WebCobra Malware From Slithering Onto Your System
Cryptocurrency mining is the way transactions are verified and added to the public ledger, a database of all the transactions...
Why Traditional Database Security Doesn’t Protect Data
If we asked database administrators, security teams, and risk teams about their definition of what database security...
“League of Legends” YouTube Cheat Links: Nothing to “LOL” About
If you’re an avid gamer, you’ve probably come across a game that just seems impossible to complete. That’s because, thanks...
325 - 336 of 617
Back to top