This Holiday Season, Watch Out for These Cyber-Grinch Tricks

This Holiday Season, Watch Out for These Cyber-Grinch Tricks

McAfee threat researchers have identified several consumer brands and product categories most frequently used by cybercriminals to trick consumers into clicking on malicious links in the first weeks of this holiday shopping season. As holiday excitement peaks and shoppers hunt for the perfect gifts and amazing deals, scammers are taking advantage of the buzz. The National Retail Federation projects holiday spending will reach between $979.5 and $989 billion this year, and cybercriminals are capitalizing by…

Read More

How to Protect Your Social Media Passwords with Multi-factor Verification | McAfee Blog

How to Protect Your Social Media Passwords with Multi-factor Verification | McAfee Blog

Two-step verification, two-factor authentication, multi-factor authentication…whatever your social media platform calls it, it’s an excellent way to protect your accounts. There’s a good chance you’re already using multi-factor verification with your other accounts — for your bank, your finances, your credit card, and any number of things. The way it requires an extra one-time code in addition to your login and password makes life far tougher for hackers. It’s increasingly common to see nowadays, where…

Read More

Location, Location, Location: Three Reasons It Matters for Your Smartphone | McAfee Blog

Location, Location, Location: Three Reasons It Matters for Your Smartphone | McAfee Blog

With its built-in location services, your smartphone can point you to plenty of places. To the location of your vacation rental. To the quickest route around a traffic jam. And to a tasty burger. It’s a tremendous convenience. Yet, there’s a flip side. Your smartphone also tracks your location. Getting to know how your phone tracks you and how you can limit that tracking can make you far more private online. The basic privacy issue…

Read More

What is malware and why should I be concerned? | McAfee Blog

Location, Location, Location: Three Reasons It Matters for Your Smartphone | McAfee Blog

What is malware? A dictionary-like definition is “malicious software that attacks computers, smartphones, and other connected devices.” In fact, “malware” is a mash-up of “malicious software.” It describes any type of software or code specifically designed to exploit a connected device or network without consent. And, unsurprisingly, hackers design most of it for financial gain. What kinds of malware are there? Think of malware as an umbrella term that covers an entire host of “bad…

Read More

10 Quick Tips for Mobile Security | McAfee Blog

Location, Location, Location: Three Reasons It Matters for Your Smartphone | McAfee Blog

All day long, it’s almost always within arm’s reach. Your smartphone. And we rely on it plenty. That makes securing your phone so important. Good thing that some of the best tips for making your phone safer are also some of the easiest. Here’s a quick rundown: Ten quick tips for mobile security 1. Lock your phone. Locking your phone is one of the most basic smartphone security measures you can take. Trouble is, few…

Read More

How to Avoid the Top 5 Scariest Mobile Threats – McAfee Blogs

How to Avoid the Top 5 Scariest Mobile Threats – McAfee Blogs

Scary movies are great. Scary mobile threats, not so much.  Ghosts, killer clowns, and the creatures can stir up all sorts of heebie-jeebies. The fun kind. Yet mobile threats like spyware, living dead apps, and botnets can conjure up all kinds of trouble.  Let’s get a rundown on the top mobile threats — then look at how you can banish them from your phone.  “I Know What You Did Because of Spyware”  Spyware is a…

Read More

How to Safely Bank Online | McAfee Blog

Location, Location, Location: Three Reasons It Matters for Your Smartphone | McAfee Blog

Mobile banking is highly secure — when you take a few straightforward steps, it becomes even safer. And those steps only take minutes, leaving you and your finances far more secure than before. Use strong passwords. Start here. Strong and unique passwords for each of your accounts form your first line of defense. However, one thing that can be a headache is the number of passwords we have to juggle — a number that seems…

Read More

How Not to Fall for Smishing Scams | McAfee Blog

How Not to Fall for Smishing Scams | McAfee Blog

With a buzz, your phone lets you know you got a text. You take a peek. It’s from the U.S. Postal Service with a message about your package. Or is it? You might be looking at a smishing scam. “Smishing” takes its form from two terms: SMS messaging and phishing. Effectively, smishing is a phishing attack on your phone. Scammers love these attacks year-round, and particularly so during holiday shopping rushes. The fact remains that…

Read More

StormBamboo Compromises ISP to Spread Malware via Updates

StormBamboo Compromises ISP to Spread Malware via Updates

New research from cybersecurity company Volexity revealed details about a highly sophisticated attack deployed by a Chinese-speaking cyberespionage threat actor named StormBamboo. StormBamboo compromised an ISP to modify some DNS answers to queries from systems requesting legitimate software updates. Multiple software vendors were targeted. The altered responses led to malicious payloads served by StormBamboo in addition to the legitimate update files. The payloads targeted both macOS and Microsoft Windows operating systems. Who is StormBamboo? StormBamboo…

Read More

What Should I do If My Phone Gets Stolen or Lost? | McAfee Blog

What Should I do If My Phone Gets Stolen or Lost? | McAfee Blog

Before your phone gets lost or stolen, put some basic steps in place. You’ll want to act quickly, so preparation is everything. With the right measures, you can find it, recover it, or even erase it if needed. These steps can get you set up so you can do exactly that. Ways to protect your smartphone from loss or theft Lock your phone. Locking your phone is one of the most basic smartphone security measures…

Read More
1 2 3 8