How to Protect Yourself From Identity Theft After a Data Breach
Did you just get word that your personal information may have been caught up in a data breach? If so,...
Let’s Make Security Easy
You flick through some reels and an ad for “a more private phone” crops up. You scroll through your news...
How to Tell Whether a Website Is Safe or Unsafe
It’s important to know that not all websites are safe to visit. In fact, some sites may contain malicious software...
What Is Smishing and Vishing, and How Do You Protect Yourself?
Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text...
True Security Requires a Holistic Approach
In the eyes of hackers, scammers, and thieves, your online privacy and identity look like a giant jigsaw puzzle. One...
Aussies Fear Snakes, Spiders and Getting Hacked
Fears and phobias. We all have them. But what are your biggest ones? I absolutely detest snakes but spiders don’t...
How Data Brokers Sell Your Identity
Our personal and professional lives are becoming increasingly intertwined with the online world. Regular internet usage has made us all...
Instagram credentials Stealer: Disguised as Mod App
Authored by Dexter Shin McAfee’s Mobile Research Team introduced a new Android malware targeting Instagram users who want to increase...
Phishing Campaigns featuring Ursnif Trojan on the Rise
Authored by Jyothi Naveen and Kiran Raj McAfee Labs have been observing a spike in phishing campaigns that utilize Microsoft...
How Secure Is Video Conferencing?
As millions of people around the world practice social distancing and work their office jobs from home, video conferencing has...