This Holiday Season, Watch Out for These Cyber-Grinch Tricks

This Holiday Season, Watch Out for These Cyber-Grinch Tricks

McAfee threat researchers have identified several consumer brands and product categories most frequently used by cybercriminals to trick consumers into clicking on malicious links in the first weeks of this holiday shopping season. As holiday excitement peaks and shoppers hunt for the perfect gifts and amazing deals, scammers are taking advantage of the buzz. The National Retail Federation projects holiday spending will reach between $979.5 and $989 billion this year, and cybercriminals are capitalizing by…

Read More

How to Reset Your Gmail Password After Being Hacked | McAfee Blog

How to Reset Your Gmail Password After Being Hacked | McAfee Blog

If you think your Gmail account’s been hacked, you’ll want to act. And act quickly. The fact is that your email has all manner of personal info in there. Receipts, tax correspondence, medical info, and so on. With a hacked account, that info might get deleted, shared, or used against you for identity theft. Luckily, Google has mechanisms in place to restore a hacked Gmail account. We’ll walk through the steps here — and a…

Read More

What Are the 6 Types of Identity Theft | McAfee Blog

How to Reset Your Gmail Password After Being Hacked | McAfee Blog

You crack open your credit card statement and something seems … off. Maybe it’s a couple of small online purchases that make you think, “Hmm, that’s strange.” Or maybe a statement shows up in your mailbox — one for a card that you don’t own at all. That calls for a huge “What the heck???” Sure enough, you’re looking at cases of identity fraud and theft. And there’s a difference between identity fraud and identity…

Read More

What Should I do If My Phone Gets Stolen or Lost? | McAfee Blog

What Should I do If My Phone Gets Stolen or Lost? | McAfee Blog

Before your phone gets lost or stolen, put some basic steps in place. You’ll want to act quickly, so preparation is everything. With the right measures, you can find it, recover it, or even erase it if needed. These steps can get you set up so you can do exactly that. Ways to protect your smartphone from loss or theft Lock your phone. Locking your phone is one of the most basic smartphone security measures…

Read More

How Does Jailbreaking Or Rooting Affect My Mobile Device Security? | McAfee Blog

How Does Jailbreaking Or Rooting Affect My Mobile Device Security? | McAfee Blog

In today’s interconnected world, our mobile devices serve as essential tools for communication, productivity, and entertainment. However, for some tech-savvy users, the allure of unlocking the full potential of their devices through jailbreaking (for iOS) or rooting (for Android) can be tempting. While these processes offer users greater control and customization over their devices, they also raise significant questions about security implications.  What is jailbreaking?  To “jailbreak” means to allow the phone’s owner to gain…

Read More

How to Protect Yourself from Vishing | McAfee Blog

How to Protect Yourself from Vishing | McAfee Blog

“Vishing” occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft. Vishing can occur both on your landline phone or via your cell phone. The term is a combination of “voice,” and “phishing,” which is the use of spoofed emails to trick targets into clicking malicious links….

Read More

How to Avoid Being Phished by Your Phone | McAfee Blog

How to Avoid Being Phished by Your Phone | McAfee Blog

By now you’ve probably heard of the term “phishing”—when scammers try to fool you into revealing your personal info or sending money, usually via email — but what about “vishing”? Vishing, or voice phishing, is basically the same practice, but done by phone. There are a few reasons why it’s important for you to know about vishing. First off, voice phishing scams are prevalent and growing. A common example around tax season is the IRS scam,…

Read More

What to Do If Your Email Is Hacked | McAfee Blog

What to Do If Your Email Is Hacked | McAfee Blog

I think I could count on my hand the people I know who have NOT had their email hacked. Maybe they found a four-leaf clover when they were kids! Email hacking is one of the very unfortunate downsides of living in our connected, digital world. And it usually occurs as a result of a data breach – a situation that even the savviest tech experts find themselves in. What Is A Data Breach? In simple…

Read More

How to Protect Yourself on Social Networks | McAfee Blog

How Does Jailbreaking Or Rooting Affect My Mobile Device Security? | McAfee Blog

There are now over 5 billion active social media users worldwide, representing 62.3% of the global population. While social networks serve as valuable tools for staying connected with loved ones and documenting life events, the ease of sharing information raises concerns. With a mere few clicks, posts and messages can inadvertently divulge significant personal details, potentially compromising privacy and leaving individuals vulnerable to identity theft. That’s why it’s crucial to make sure you’ve got the…

Read More

How to Steer Clear of Tax Season Scams

How to Steer Clear of Tax Season Scams

It’s that time of year again – tax season! Whether you’ve already filed in the hopes of an early refund or have yet to start the process, one thing is for sure: cybercriminals will certainly use tax season as a means to get victims to give up their personal and financial information. This time of year is advantageous for malicious actors since the IRS and tax preparers are some of the few people who actually…

Read More
1 2 3