Consumer Threat Notices

Hackers are Cashing in on Instagram Likes

They say popularity has its price. This saying holds a new weight when it comes to the growing influence of social media. In fact, your “Likes” may be worth more to hackers than your credit card number. As counterintuitive as it may seem, your social clout has become the new ...

Consumer Threat Notices

Don’t Take a Bite out of that Apple Gift Card Scam

Good rule of thumb on the web: When it seems too good to be true, it probably is. Those ads on the right side of your web page, promising to give you a brand new iPad for absolutely free…probably a scam. The direct message on Twitter you received stating that ...

Mobile and IoT Security

BYOD: Balancing Convenience and Security

It lies next to you as you sleep, comes with you to work, rides home with you in your car and even travels with you on vacation. Your smartphone goes with you everywhere. Although convenient, the unprecedented connectivity we are experiencing culturally with mobile devices can create an equally daunting ...

Consumer Threat Notices

Who’s watching whom? Is Your Smart TV Spying on You?

Like something right out of George Orwell’s 1984, it turns out that Big Brother, or Big Hacker in this case, may in fact be watching you—through your television. Recent research shows that Smart TVs are just as vulnerable to a hacking attack as your home computer. After months of research ...

Mobile and IoT Security

Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors

Nothing in life is free, and that’s especially true when it comes to mobile apps. Thousands of free apps are flooding the marketplace—most are legitimate and available at no initial cost. But they often come at the price of offering up data from your smartphone or tablet that you might ...

Consumer Threat Notices

Protect Your Social Passwords with Two-Step Verification

It’s not all fun and games when it comes to your favorite social media sites. Many of the top sites such as Facebook and Twitter are used for entertainment and leisure, but they also store vital information identity thieves would love to get their hands on and disrupt your online life. ...

Identity Protection

How the Proliferation of Mobile Devices is Impacting Consumer Security

Mobile technology is the new frontier for fraudsters. Most of us don’t protect our smartphones or tablets—and the private information they contain—anywhere near as well as we do our wallets and PCs (even though most us would rather lose our wallets vs. our smartphones). Even the simple safeguard of a ...

Enterprise

Taking Control Of Your Data In The Cloud

This blog was written by David Bull, McAfee’s former Director, Enterprise Solution Marketing. Who has access to my online data? What measures are being taken to protect it? What can I do to make sure it doesn’t end up in the wrong hands? The concerns behind these questions are rooted in our ...

Consumer Threat Notices

Are You Stressed Out About Passwords? Consider a Simple Option

Used correctly, passwords help keep your personal information safe, and if you’re like me, you probably have dozens (or in my case hundreds) of online accounts and mobile apps that require one. So it’s no surprise that people have adapted some coping strategies to make passwords memorable yet distinctive. The ...

Family Safety Identity Protection Mobile and IoT Security

Why it’s Critical to Protect Data on Digital Devices

When devices are lost or hacked and your data is exposed, not only is this a pain to deal with, but you could become a victim of identity theft. Not only do victims of identity theft suffer loss of time  but they also lose money that may not be able ...

Subscribe to McAfee Securing Tomorrow Blogs