How to guard against the holiday cyberattack surge

How to guard against the holiday cyberattack surge

Historical trends indicate a marked increase in cyberattacks during the holiday season. Cybercriminals take advantage of heightened online activity and digital transactions, using this busy period to target consumers with precision. However, it’s not just individual shoppers who are at risk — enterprises are equally vulnerable. In fact, recent research shows a staggering 550% surge in unique threats during this time of year. Organizations become prime targets for a wide array of cyberattacks as the…

Read More

How to Reset Your Gmail Password After Being Hacked | McAfee Blog

How to Reset Your Gmail Password After Being Hacked | McAfee Blog

If you think your Gmail account’s been hacked, you’ll want to act. And act quickly. The fact is that your email has all manner of personal info in there. Receipts, tax correspondence, medical info, and so on. With a hacked account, that info might get deleted, shared, or used against you for identity theft. Luckily, Google has mechanisms in place to restore a hacked Gmail account. We’ll walk through the steps here — and a…

Read More

Are Ghost Calls a Problem? Yes, if They Don’t Stop

Are Ghost Calls a Problem? Yes, if They Don’t Stop

A ghost call is an incoming call with no one on the other end when you answer it. Sometimes it’s an unrecognized number; other times the caller ID shows “Unknown.” Getting an occasional ghost call is common and nothing to worry about. But persistent ghost calls can be a major concern — particularly for businesses. Here’s why. Frequent ghost calls can tie up phone lines, preventing legitimate calls from reaching the company. This disruption can…

Read More

Why the UN Convention Against Cybercrime Requires a Second Look

Why the UN Convention Against Cybercrime Requires a Second Look

Cybercrime is escalating globally. Criminal groups are leveraging advanced technology to operate across borders, necessitating that law enforcement agencies have the capabilities to prevent, investigate, and prosecute these crimes while also protecting human rights. Effective international cooperation is essential to combat these threats and uphold shared values. However, the recently adopted UN Convention against Cybercrime falls short and requires more attention before ratification by member states. Concerns for human rights and liberal democracies values in…

Read More

How Do I Protect Myself When Using Wi-Fi? | McAfee Blog

How Do I Protect Myself When Using Wi-Fi? | McAfee Blog

Wi-Fi is everywhere. Whether you travel for business or simply need Internet access while out and about, your options are plentiful. You can sign on at airports, hotels, coffee shops, fast food restaurants, and now, even airplanes. Wi-Fi wasn’t born to be secure; it was born to be convenient. Wireless networks broadcast messages using radio and are therefore more susceptible to eavesdropping than wired networks. Today, with criminal hackers as sophisticated as ever, if you…

Read More

How to Protect Yourself from Vishing | McAfee Blog

How to Protect Yourself from Vishing | McAfee Blog

“Vishing” occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft. Vishing can occur both on your landline phone or via your cell phone. The term is a combination of “voice,” and “phishing,” which is the use of spoofed emails to trick targets into clicking malicious links….

Read More

How To Prevent Your Emails From Being Hacked | McAfee Blog

How To Prevent Your Emails From Being Hacked | McAfee Blog

My mother recently turned 80, so of course a large celebration was in order. With 100 plus guests, entertainment, and catering to organise, the best way for me to keep everyone updated (and share tasks) was to use Google Docs. Gee, it worked well. My updates could immediately be seen by everyone, the family could access it from all the devices, and it was free to use! No wonder Google has a monopoly on drive…

Read More

What to Do If Your Email Is Hacked | McAfee Blog

How Do I Protect Myself When Using Wi-Fi? | McAfee Blog

I think I could count on my hand the people I know who have NOT had their email hacked. Maybe they found a four-leaf clover when they were kids! Email hacking is one of the very unfortunate downsides of living in our connected, digital world. And it usually occurs as a result of a data breach – a situation that even the savviest tech experts find themselves in. What Is A Data Breach? In simple…

Read More

How to Steer Clear of Tax Season Scams

How to Steer Clear of Tax Season Scams

It’s that time of year again – tax season! Whether you’ve already filed in the hopes of an early refund or have yet to start the process, one thing is for sure: cybercriminals will certainly use tax season as a means to get victims to give up their personal and financial information. This time of year is advantageous for malicious actors since the IRS and tax preparers are some of the few people who actually…

Read More

5 crucial cybersecurity resolutions to embrace this World Backup Day

5 crucial cybersecurity resolutions to embrace this World Backup Day

World Backup Day is coming up on March 31st. But let’s face it: like most commemorative dates, it’s a fluffy holiday standing in for a critical idea — businesses and individuals need to take data security way more seriously than they currently do. Against a backdrop of rising cybercrime, this is especially true. Cybercrime’s global cost will skyrocket over the next four years, going from $9.22 trillion in 2024 to $13.82 trillion in 2028. And…

Read More
1 2 3 4