Privacy & Identity Protection

Identity theft has evolved far beyond just credit card fraud and unfortunately is a rapidly growing crime. McAfee Identity Protection blogs cover preventative measures related to scams, phishing, and ransomware. Read the latest blogs for tips to protect your identity and privacy.

McAfee Focused on Protecting Customers’ Identity, Connected Homes and Wi-Fi Connections
As we kick off the new year, McAfee is optimistic about what the future holds. We protect...
Meltdown and Spectre 101: What to Know About the New Exploits
Between the Blueborne vulnerabilities and the High Sierra Mac flaw – we saw some nasty bugs in...
Key Findings from our Survey on Identity Theft, Family Safety and Home Network Security
The world is connecting to the internet now more than ever before. As a result, the popularity...
How the IoT supports the world’s largest industries
This blog post was written by Nick Viney. The Internet of Things (IoT) has already helped to...
So, Your Child Wants A Smartwatch for Christmas? Here’s What You Need to Know
If your teen wants a Smartwatch, here are some pros and cons to these devices and steps you can take...
Starbucks Bitcoin Mining Incident Reminds Us of the Risks of Public Wi-Fi
Most of us order our coffee with half and half, or a pastry on the side. But...
Suntan, Sunglasses, Suitcases… and Devices! Indians Find It Hard to Unplug on Vacations
I was showing a friend around Kolkata when we noted several tourists (very evident because of their...
10 Pro-Active Ways to Dodge the Traps of Identity Thieves
Identity theft hits hard. Here are 10 ways to shore up your personal information online and avoid digital danger zones.
Protecting Your Personal Identity During Holidays
December is finally upon us, which means the holidays are coming. While we’ll all be thinking about...
How to Keep Your Data & Devices Safe While Traveling
Whether you are traveling for the holidays, summer break, or for business, there are steps you can...
Massive Security Flaw for High Sierra Macs Emerges
When it comes to cybersecurity, we’ve seen our fair share of device flaws. Sometimes, hackers leverage these...
How IoT is revolutionising the world of sport
This blog post was written by Nick Viney. When we think about the ‘Internet of Things’ (IoT)...
397 - 408 of 617
Back to top