What Does It Take To Be Digitally Secure?
Let’s get one thing straight: it’s no longer possible to deny that your life in the physical world and your...
Mobile and Phishing – Why It’s More Dangerous
Phishing occurs when scammers send emails that appear to have been sent by legitimate, trusted organizations in order to lure...
Protect Yourself from Vishing
“Vishing” occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers...
Myth: Apple Products Don’t Get Viruses
Have you ever bitten into an apple and found a worm? I have, and it’s yummy! Anyway, how many times...
15 Social Media Security Tips
1. Realize that you can become a victim at any time. Not a day goes by when we don’t hear...
Social Networking Security Awareness
One in five online consumers has been a victim of cybercrime in the past two years. Social networking is a...
15 Tips To Better Password Security
Protect your information by creating a secure password that makes sense to you, but not to others. Most people don’t...
How to Reset Your Gmail Password After Being Hacked
I finally got one of those “I’m stuck in London” emails. My friend Kate’s Gmail account was hacked, and everyone...
Security Threat Concerns ATM Industry
Today, there are over 2.2 million ATMs worldwide, and by 2015 there will be around 3 million. ATM skimming accounts...
Most Unwanted Criminals: Phishers, Shoulder Surfers and Keyloggers
McAfee’s most unwanted criminals have included pickpockets, Trojan viruses, and ATM skimmers, dumpster divers, spies, and wireless hackers and now...