Privacy & Identity Protection

Identity theft has evolved far beyond just credit card fraud and unfortunately is a rapidly growing crime. McAfee Identity Protection blogs cover preventative measures related to scams, phishing, and ransomware. Read the latest blogs for tips to protect your identity and privacy.

Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own
Director Michael Mann’s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic...
To Preserve Bandwidth, Gogo Inflight Executes a Man-in-the-Middle Attack
Early last week, Gogo Inflight, a provider of in-flight Internet access for airlines, caught a lot of...
How Hackers Use Popular Shows to Infect Your Devices
If there’s one reasonable measurement of how popular a television series has become, it’s how often it’s...
Should You Use Near-Field Communications?
Have you ever wondered what kind of superpower you’d have? I’ve always wanted to send messages and...
Doxxing, The Internet and How You Can Lock Down Your Data
There exists, in this world of ours, a term describing the public release of a person’s identity...
What is Pharming?
. For a lot of kids today, mash-ups are all the rage—whether it’s combining two videos, two...
Youth & Social Media
The digital world is here to stay. The youth are growing up with and making internet technologies,...
Bypassing Microsoft’s Patch for the Sandworm Zero Day
This is the second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch...
What Is a Trojan Horse?
One of history’s great literary classics is Homer’s Iliad, which tells the story of the Trojan horse—the...
What is Criminal Identity Theft?
Identity theft gets all kinds of buzz in the news. It’s not hard to see why—in 2012,...
Android’s CyanogenMod Vulnerable to Zero-Day Threat
Have you installed CyanogenMod on your Android device? If yes, you’re likely vulnerable to a newly discovered...
Banks are Using Biometric Measures to Protect Against Fraud
When thinking about biometric security, one might picture Mission Impossible-like retinal scanning or fingerprint reading technology a...
541 - 552 of 606
Back to top