Identity Protection

McAfee Identity Protection blogs cover preventative measures related to scams, phishing, and ransomware. Read the latest blogs for tips to protect your identity.

Consumer Threat Notices Family Safety Identity Protection

Learn How to Spot a Phishy Email and Stay Safe

This blog post was written by Bruce Snell. One piece of advice I always give (after update, update, update) is to never click on a suspicious link.  A lot of times, those dodgy links are easy to spot, which is why cybercriminals try to be extra tricky to get you ...

Consumer Threat Notices Family Safety Identity Protection

Now Dolls Can be Hacked Too

This blog post was written by Bruce Snell. Soon after posting our Most Hackable Gifts blog, NBC 5 in Chicago released an investigative report on a popular interactive doll being hacked.  In the report, the security researcher detailed some of what he was able to get from the Barbie doll ...

Identity Protection

What is a Hacker?

You probably think you know what a “hacker” is, but the images portrayed in the media can be misleading. You may be thinking of a geeky-looking guy who causes peoples’ computers to get infected with viruses or cracks passwords to raid the accounts of big business. This is one kind ...

Identity Protection Mobile and IoT Security

How to Stop Sharing Your Location Information

The Internet helps us connect and share with people around the world, but there are some people with whom you definitely shouldn’t be sharing your information. Although it’s not pleasant to think about, it’s not just friends and family that can see your online posts, bad guys can too, including ...

Identity Protection

Why use a VPN?

If you want to be a pro at privacy, here’s a tip: When it’s time to go online, whether it’s at an airport lounge, coffee house, hotel, or any other public Wi-Fi spot, don’t log into any of your accounts unless you use a virtual private network (VPN). A VPN ...

Identity Protection

Back to school Tech Security for College Students

Some of us remember college dorm days, when students were envied if they had their own typewriter. These days, college students must have a personal laptop computer, and a smartphone, and their lives revolve around these connected devices.  Such dependency should be proactively protected from loss or theft.  Campus security ...

Identity Protection

Passwords in Real Life: Don’t be Lazy

It’s tough being responsible sometimes. And managing responsibilities for what is precious in your life usually takes a little extra thought.  Let’s say you’ve just welcomed a beautiful set of triplets into the world.  Lucky you . . . and lots to managed! But, you wouldn’t give all these babies ...

Identity Protection

Don’t Rely on the Password Reset

Think about your keychain. It probably holds the necessities: car keys, home keys, work keys, miscellaneous keychains you bought on your previous vacations. Now, imagine you have a keychain full of these keys that all look the same, but each only opens a specific door. Sounds kind of like your ...

Identity Protection

Be Cautious When Using Wi-Fi

The proliferation of mobile devices means that we can work or play online from almost anywhere, so it’s no surprise that public Wi-Fi networks have become more common. From hotels and coffee shops, to universities and city centers, Wi-Fi is widely available, but is connecting to these networks safe? If ...

Identity Protection

What is a Cache?

Perhaps someone has told you that you need to “clear your cache,” but what does this mean and why should you do it? A cache is a folder of recently visited webpages, which is stored on your computer’s hard drive, and maintained by your Internet browser. The purpose of a ...

Subscribe to McAfee Securing Tomorrow Blogs