Location, Location, Location: Three Reasons It Matters for Your Smartphone | McAfee Blog

Location, Location, Location: Three Reasons It Matters for Your Smartphone | McAfee Blog

With its built-in location services, your smartphone can point you to plenty of places. To the location of your vacation rental. To the quickest route around a traffic jam. And to a tasty burger. It’s a tremendous convenience. Yet, there’s a flip side. Your smartphone also tracks your location. Getting to know how your phone tracks you and how you can limit that tracking can make you far more private online. The basic privacy issue…

Read More

What is malware and why should I be concerned? | McAfee Blog

Location, Location, Location: Three Reasons It Matters for Your Smartphone | McAfee Blog

What is malware? A dictionary-like definition is “malicious software that attacks computers, smartphones, and other connected devices.” In fact, “malware” is a mash-up of “malicious software.” It describes any type of software or code specifically designed to exploit a connected device or network without consent. And, unsurprisingly, hackers design most of it for financial gain. What kinds of malware are there? Think of malware as an umbrella term that covers an entire host of “bad…

Read More

10 Quick Tips for Mobile Security | McAfee Blog

Location, Location, Location: Three Reasons It Matters for Your Smartphone | McAfee Blog

All day long, it’s almost always within arm’s reach. Your smartphone. And we rely on it plenty. That makes securing your phone so important. Good thing that some of the best tips for making your phone safer are also some of the easiest. Here’s a quick rundown: Ten quick tips for mobile security 1. Lock your phone. Locking your phone is one of the most basic smartphone security measures you can take. Trouble is, few…

Read More

How to Avoid the Top 5 Scariest Mobile Threats – McAfee Blogs

How to Avoid the Top 5 Scariest Mobile Threats – McAfee Blogs

Scary movies are great. Scary mobile threats, not so much.  Ghosts, killer clowns, and the creatures can stir up all sorts of heebie-jeebies. The fun kind. Yet mobile threats like spyware, living dead apps, and botnets can conjure up all kinds of trouble.  Let’s get a rundown on the top mobile threats — then look at how you can banish them from your phone.  “I Know What You Did Because of Spyware”  Spyware is a…

Read More

How to Safely Bank Online | McAfee Blog

Location, Location, Location: Three Reasons It Matters for Your Smartphone | McAfee Blog

Mobile banking is highly secure — when you take a few straightforward steps, it becomes even safer. And those steps only take minutes, leaving you and your finances far more secure than before. Use strong passwords. Start here. Strong and unique passwords for each of your accounts form your first line of defense. However, one thing that can be a headache is the number of passwords we have to juggle — a number that seems…

Read More

How Not to Fall for Smishing Scams | McAfee Blog

How Not to Fall for Smishing Scams | McAfee Blog

With a buzz, your phone lets you know you got a text. You take a peek. It’s from the U.S. Postal Service with a message about your package. Or is it? You might be looking at a smishing scam. “Smishing” takes its form from two terms: SMS messaging and phishing. Effectively, smishing is a phishing attack on your phone. Scammers love these attacks year-round, and particularly so during holiday shopping rushes. The fact remains that…

Read More

StormBamboo Compromises ISP to Spread Malware via Updates

StormBamboo Compromises ISP to Spread Malware via Updates

New research from cybersecurity company Volexity revealed details about a highly sophisticated attack deployed by a Chinese-speaking cyberespionage threat actor named StormBamboo. StormBamboo compromised an ISP to modify some DNS answers to queries from systems requesting legitimate software updates. Multiple software vendors were targeted. The altered responses led to malicious payloads served by StormBamboo in addition to the legitimate update files. The payloads targeted both macOS and Microsoft Windows operating systems. Who is StormBamboo? StormBamboo…

Read More

What Should I do If My Phone Gets Stolen or Lost? | McAfee Blog

What Should I do If My Phone Gets Stolen or Lost? | McAfee Blog

Before your phone gets lost or stolen, put some basic steps in place. You’ll want to act quickly, so preparation is everything. With the right measures, you can find it, recover it, or even erase it if needed. These steps can get you set up so you can do exactly that. Ways to protect your smartphone from loss or theft Lock your phone. Locking your phone is one of the most basic smartphone security measures…

Read More

Why Should You Pay for a Security Solution?

Why Should You Pay for a Security Solution?

We all love free stuff. (Costco samples, anyone?) However, when it comes to your family’s security, do free online protection tools offer the coverage you truly need? Not always. In fact, they might invade the privacy you’re trying to protect. Here’s why. Free tools don’t offer the level of advanced protection that life on today’s internet needs. For starters, you’ll want malware and antivirus protection that’s as sophisticated as the threats they shut down. Ours includes AI technology and…

Read More

Do You Share Passwords with Friends and Family? | McAfee Blog

Do You Share Passwords with Friends and Family? | McAfee Blog

Do you? I do and I’ve been doing it since I said “I do.” And if you are married or at least in a committed lifelong relationship, knowing each other’s passwords is probably expected. Today, sharing passwords has become a sign of commitment, a signal of love and devotion, like a varsity sweater or friendship ring. But what’s happens when the relationship goes sour (with a divorce rate of 50% to back me up here)?…

Read More
1 2 3 7