[breadcrumb]
How To Guides and Tutorials Privacy & Identity Protection Mobile Security

How To Protect Yourself from SMiShing Attacks

SMiShing is a deceptive practice where scammers send fraudulent text messages masquerading as reputable institutions, aiming to dupe recipients into clicking on a link, calling a number, or providing sensitive personal information. The risk with SMiShing is that mobile users tend to trust their SMS messages more than their emails, ...

Internet Security Privacy & Identity Protection

How Cybercriminals Are Shopping for Personal Data This Black Friday

While the majority of us look forward to Black Friday and Cyber Monday for the best deals, there’s another group...

Internet Security How To Guides and Tutorials

Christmas Shopping 2020

How To Stay Safe While Shopping Online This Holiday Season I’m pleased to report that I’ve achieved a number of...

How To Guides and Tutorials Privacy & Identity Protection

How To Keep Your Data Private Online

Whether data gets collected for advertising purposes, or to generate profit by selling data to others, your privacy has a price tag on it. Yet you have some say in all this. You can take several steps that can minimize the data trail that you create by going online. Put ...

Mobile Security Family Safety

Understanding the Risks of Using an Android Device

Android has, over time, become a popular target for hackers. Recently, McAfee Labs™ found that all new forms of malicious mobile software were solely designed to exploit vulnerabilities in the Android operating system.

Family Safety

5 Ways to Safeguard Your Child’s Instagram Bio

Keeping your child safe online is a growing concern for many parents. However, there are ways you can help safeguard your child’s Instagram bio and enhance their online safety. Here are 5 tips to consider.

Privacy & Identity Protection Mobile Security

Beware of Malicious Mobile Apps

With the surge in the usage of mobile phones, there has been a concurrent increase in malicious activities targeting these devices. One common technique used by hackers is to corrupt legitimate applications. Android devices, in particular, see increases in malware targeting mobile phones year by year.

Internet Security Mobile Security

The Mobile Web vs. Native Apps

The debate between the mobile web and native apps has become increasingly relevant, with each approach offering unique advantages and disadvantages. This article aims to provide a comprehensive comparison between mobile web and native apps, with a particular emphasis on how each can impact your online safety.

Internet Security Mobile Security

US-B Careful: Public iPhone Chargers Lie in Wait

It is common knowledge that connecting your devices to public Wi-Fi can expose them to potential malware and other security risks. But have you ever considered the dangers that might be lurking within public USB chargers?

Family Safety

Keeping Virtual Play Dates, Hangouts, and Video Chats Safe for Everyone

While virtual playdates, hangouts, and video chats provides an excellent solution for children to interact with their peers, it has also opened up a new avenue for potential risks and dangers. In this article, we will provide some essential strategies for maintaining a secure and enjoyable online social environment for ...

Subscribe to McAfee Securing Tomorrow Blogs