www.mcafee.com Open in urlscan Pro
104.70.95.190  Public Scan

Submitted URL: https://mcafeeinc-mkt-prod2-t.adobe-campaign.com/r/?id=hd785a9ea,6fa1c6de,6fa1d0c9&e=cDE9RE0zMDAxNDkxJnAyPTIwMjRfMDRfMTdfUkVUX1BPQ19EeW5hbWljX05l...
Effective URL: https://www.mcafee.com/blogs/internet-security/what-are-pig-butchering-scams-and-how-do-they-work/
Submission: On April 17 via api from BE — Scanned from DE

Form analysis 4 forms found in the DOM

https://www.mcafee.com/blogs

<form class="desktop-search-form-v2" action="https://www.mcafee.com/blogs">
  <div><span class="search_icon_desktop"> <img src="/blogs/wp-content/themes/securingtomorrow-brillio/img/new-icons/search_icon_black.svg" alt="search grey icon"> </span></div>
  <div class="desktop-search-div"><input class="dsk-search" autocomplete="off" name="s" type="text" placeholder="Search"></div>
</form>

https://www.mcafee.com/blogs

<form class="desktop-search-form" style="display: none;" action="https://www.mcafee.com/blogs">
  <div class="desktop-search-div"><input class="dsk-search" autocomplete="off" name="s" type="text" placeholder="Type and hit enter..."></div>
  <div><span class="close_icon_desktop"> <img src="https://www.mcafee.com/blogs/wp-content/themes/securingtomorrow-brillio/img/new-icons/cross-grey-icon.svg" alt="close grey icon"> </span></div>
</form>

https://www.mcafee.com/blogs

<form class="form-inline my-2 my-lg-0" action="https://www.mcafee.com/blogs">
  <div class="input-group mb-3 search-div">
    <div class="input-group-append"><button class="sarch-btn" type="button"><span class="fa fa-search" title="Type and hit enter..."><span style="display: none;">.</span></span> </button>
    </div>
  </div>
</form>

https://www.mcafee.com/blogs

<form action="https://www.mcafee.com/blogs" class="desktop-search-form" style="display: none;">
  <div class="desktop-search-div">
    <input class="dsk-search" name="s" type="text" placeholder="Type and hit enter..." autocomplete="off">
  </div>
  <div><span class="close_icon_desktop">
      <img src="https://www.mcafee.com/blogs/wp-content/themes/securingtomorrow-brillio/img/new-icons/cross-grey-icon.svg" alt="close grey icon">
    </span>
  </div>
</form>

Text Content

 * Products
   
    * All-In-One Protection
      
      * NEW
        McAfee+ Individual Plans
        
        Complete privacy, identity and device protection for individuals.
      
      * NEW
        McAfee+ Family Plans
        
        Complete privacy, identity and device protection for up to 6 family
        members.
   
    * Other Products & Services
      
      * Antivirus
      * Scam Protection
      * Virtual Private Network (VPN)
      * Mobile Security
      * PC Optimizer
      * TechMaster Concierge
      * McAfee Assist
   
    * Free Tools & Downloads
      
      * Web Protection
      * Free Antivirus Trial
      * Device Security Scan
      * Password Generator

 * Features
   
    * Keep Me Private Online
      
      * Personal Data Cleanup
      * Online Account Cleanup
      * VPN (Virtual Private Network)
      * Social Privacy Manager
   
    * Safeguard My Identity
      
      * Identity Monitoring
      * Credit Monitoring
      * Security Freeze
      * Identity Theft Coverage & Restoration
      * Password Manager
   
    * Protect My Devices
      
      * Antivirus
      * Scam Protection
      * Web Protection
   
    * Protect My Family
      
      * Protection Score
      * Parental Controls
      * Family Plans

 * Resources
   
    * Stay Updated
      
      * McAfee Blog
      * Reports and Guides
      * McAfee on YouTube
      * Prevent Spam and Phishing
   
    * Learn More
      
      * Learn at McAfee
      * What is Antivirus?
      * What is a VPN?
      * What is Identity Theft?
   
    * Press & News
      
      * McAfee Newsroom
      * AI News & Scams

 * About Us
   
    * Our Company
      
      * Company Overview
      * Awards & Reviews
      * Investors
   
    * Our Efforts
      
      * Inclusion & Diversity
      * Integrity & Ethics
      * Public Policy
   
    * Join Us
      
      * Careers
      * Life at McAfee
      * Our Teams
      * Our Locations

 * Why McAfee

Products

All-In-One Protection

NEW McAfee+ Individual Plans

Complete privacy, identity and device protection for individuals.

NEW McAfee+ Family Plans

Complete privacy, identity and device protection for up to 6 family members.

Other Products & Services

Antivirus

Scam Protection

Virtual Private Network (VPN)

Mobile Security

PC Optimizer

TechMaster Concierge

McAfee Assist

Free Tools & Downloads

Web Protection

Free Antivirus Trial

Device Security Scan

Password Generator

Features

Keep Me Private Online

Personal Data Cleanup

Online Account Cleanup

VPN (Virtual Private Network)

Social Privacy Manager

Safeguard My Identity

Identity Monitoring

Credit Monitoring

Security Freeze

Identity Theft Coverage & Restoration

Password Manager

Protect My Devices

Antivirus

Scam Protection

Web Protection

Protect My Family

Protection Score

Parental Controls

Family Plans

Resources

Stay Updated

McAfee Blog

Reports and Guides

McAfee on YouTube

Prevent Spam and Phishing

Learn More

Learn at McAfee

What is Antivirus?

What is a VPN?

What is Identity Theft?

Press & News

McAfee Newsroom

AI News & Scams

About Us

Our Company

Company Overview

Awards & Reviews

Investors

Our Efforts

Inclusion & Diversity

Integrity & Ethics

Public Policy

Join Us

Careers

Life at McAfee

Our Teams

Our Locations

Why McAfee
Support

Help

Customer Support

Support Community

FAQs

Contact Us

Activation

Activate Retail Card

Region

Asia Pacific

Australia - English

New Zealand - English

Singapore - English

Malaysia - English

Philippines - English

India - English

대한민국 - 한국어

日本 - 日本語

中国 - 简体中文

香港特別行政區 - 繁體中文

台灣 - 繁體中文

Europe

Česká Republika - Čeština

Danmark - Dansk

Suomi - Suomi

France - Français

Deutschland - Deutsch

Ελλάδα - Ελληνικά

Ireland - English

Magyarország - Magyar

ישראל - עברית

Italia - Italiano

Nederland - Nederlands

Norge - Bokmål

Polska - Polski

Portugal - Português

Россия - Русский

España - Español

Sverige - Svenska

Suisse - Français

Schweiz - Deutsch

Türkiye - Türkçe

العربية - العربية

United Kingdom - English

North America

United States - English

Canada - English

Canada - Français

South America

Argentina - Español

Brasil - Português

Chile - Español

Colombia - Español

México - Español

Perú - Español

Sign in
 * Support
   
    * Help
      
      * Customer Support
      * Support Community
      * FAQs
      * Contact Us
   
    * Activation
      
      * Activate Retail Card

 *  * Asia Pacific
      
      * Australia-English
      * New Zealand-English
      * Singapore-English
      * Malaysia-English
      * Philippines-English
      * India-English
      * 대한민국-한국어
      * 日本-日本語
      * 中国-简体中文
      * 香港特別行政區-繁體中文
      * 台灣-繁體中文
   
    * Europe
      
      * Česká Republika-Čeština
      * Danmark-Dansk
      * Suomi-Suomi
      * France-Français
      * Deutschland-Deutsch
      * Ελλάδα-Ελληνικά
      * Ireland-English
      * Magyarország-Magyar
      * ישראל-עברית
      * Italia-Italiano
      * Nederland-Nederlands
   
    *  
      
      * Norge-Bokmål
      * Polska-Polski
      * Portugal-Português
      * Россия-Русский
      * España-Español
      * Sverige-Svenska
      * Suisse-Français
      * Schweiz-Deutsch
      * Türkiye-Türkçe
      * العربية-العربية
      * United Kingdom-English
   
    * North America
      
      * United States-English
      * Canada-English
      * Canada-Français
   
    * South America
      
      * Argentina-Español
      * Brasil-Português
      * Chile-Español
      * Colombia-Español
      * México-Español
      * Perú-Español

 * Sign in


 * 
 * Blog
 * Topics
   How To Guides and Tutorials Internet Security Mobile Security Family Safety
   Privacy & Identity Protection Security News
 * At McAfee
   McAfee News Executive Perspectives McAfee Labs Life at McAfee Hackable?
   Podcast


 * English
   * Portuguese (BR)
   * Spanish
   * French(FR)
   * German
   * Italian
   * Japanese
   * French(CA)
   * Portuguese (PT)
   * Spanish (MX)
   * Dutch


   
 * 
   
 * Blog
 * Topics
   How To Guides and Tutorials Internet Security Mobile Security Family Safety
   Privacy & Identity Protection Security News
 * At McAfee
   McAfee News Executive Perspectives McAfee Labs Life at McAfee Hackable?
   Podcast
   

 * .
 * Portuguese (BR) Spanish French(FR) German Italian Japanese French(CA)
   Portuguese (PT) Spanish (MX) Dutch



Blog Internet Security What are Pig Butchering Scams and How Do They Work?


WHAT ARE PIG BUTCHERING SCAMS AND HOW DO THEY WORK?



McAfee

Mar 08, 2024

13 MIN READ

“Jessica” cost him one million dollars.  

In an account to Forbes, one man described how he met “Jessica” online.i
Readily, they formed a friendship. Turns out, “Jessica” was a great listener,
particularly as he talked about the tough times he was going through. Through
chats on WhatsApp, he shared the struggles of supporting his family and rapidly
ailing father.  

The story telegraphs itself. Yes, “Jessica” was a scammer. Yet this scam put a
new twist on an old con game. The man fell victim to a pig butchering scam — a
scam that weaves together long strings of messages, cryptocurrency, and bogus
investment opportunities. 

Many victims lose everything.  

“Jessica’s” victim broke down the scam, how it worked, and how he got roped in.
It began with an introductory text in October that spun into a WhatsApp
transcript spanning 271,000 words. Throughout, he shared his family and
financial struggles. 

Then, “Jessica” offered hope. Investments that would turn a fast buck.  

“Jessica” walked him through several transactions on an app he was told to
download. Small investments at first, yet increasingly larger. “Jessica” needed
him to invest more and more, despite his reservations. Yet his balance grew and
grew each time he followed her explicit directions.  

Then, the trap sprung. Twice. In November, he logged into the app and found a
negative balance close to half a million dollars. “Jessica” reassured him that
he could get it back, and then some. “Jessica” encouraged him to borrow. He did.
From his bank and a childhood friend.  

Soon, he was back up to nearly $2 million. Or so he thought. In December, he
logged into the app once again and found a negative balance of $1 million. His
savings and borrowed money alike disappeared — straight into the hands of
scammers. All the while, they manipulated the app with a plug-in that fabricated
financial results. His whopping gains were actually massive losses. 

He’s far from the only victim of pig butchering. Last year, we brought you the
story of “Leslie,” a retired woman who fell victim to a different form of the
same scam. A so-called friend she met online directed her to invest her
retirement funds for even more returns. Soon, a lonely yet otherwise sharp
retiree found herself down $100,000.  

Victims like these find themselves among the thousands of people who fall for
pig butchering scams each year. The problem is global in scope, costing billions
of dollars each year. Yet as pig butchering represents a new type of scam, it
uses some age-old tricks to separate people from their money.  

With that, pig butchering scams are preventable. Awareness plays a major role,
along with several other steps people can take to keep it from happening to
them. 


WHAT’S A PIG BUTCHERING SCAM? 

It’s a con game with a vivid name. Just as a livestock farm raises pork for
profit, scammers foster long-term relationships with their victims for profit.
The scammers start by taking small sums of money, which increase over time,
until the victim finally gets “fattened up” and “butchered” for one final
whopping sum. The term appears to have origins in the Chinese phrase zhu zai,
meaning “to slaughter a pig.” 

What sets pig butchering scams apart from romance scams, elder scams, and other
con games is cryptocurrency. Scammers lure their victims into investing in
ventures, seemingly profitable ones because the scammers appear to make the same
investments themselves. With great success. Victims then mirror those
investments, yet the “market” is rigged. With phony sites and apps, the
scammers point to big gains — which are all mocked up on the screen. Instead,
the money goes straight to them. 

The scam follows a script, one that “Jessica” played out to the letter. You can
see the steps. 

It starts out innocently enough. A text on the phone, a note on a messaging app,
or a direct message on social media comes to the victim from out of the blue.
It’s from someone they don’t know, and they might ask a simple question, like … 

“Is this John? We shared a tee time at the course last week and I have that
extra club I said I’d give you.” 

“Hi, Sally. It’s me. Sorry I can’t make lunch today. Can we reschedule?” 

Or even as simple as … 

“Hey.” 

These “wrong number” texts and messages are anything but unintended. In some
cases, victims get randomly picked. Blasts of texts and messages get sent to
broad audiences, all in the hope that a handful of potential victims will
reply. 

Yet, by and large, victims get carefully selected. And researched. The scammers
work from a dossier of info gathered on the victim, full of tidbits harvested
from the victim’s online info and social media profiles. Who puts together those
dossiers? Often, it’s a large, organized crime operation. The scammer behind the
messages is only one part of a much larger scamming machine, which we’ll cover
in a bit. 

With that intel in hand, the scammers have their opening.  

After an introduction, the scammer kicks off a conversation. Over time, the
conversations get personal. And those personal touches have a way of luring
people in. Scammers pose as another person, such as “Jessica,” sprinkle things
into the conversation like similar interests or family backgrounds. Anything
that’s just enough to intrigue the victim and keep them chatting. 

From there, scammers play a long con game, building trust with their victims
over time. Things tend to get increasingly personal. The scammer pumps the
victim for more and more news of their life. What they’re worried about. What
dreams they have. And in cases where the scam takes a romantic turn, how they’ll
build a life together. 

Then, money comes into play. 

With a solid read on their victims and their lives, scammers drop hints about
investment opportunities with big returns. The scammer rarely takes the money
themselves. In fact, they almost always insist that the victim handles the money
themselves. Instead, scammers lure their victims into using bogus apps that look
like they support a legitimate trading platform. Yet they’re not. These apps act
as a direct line to the scamming operation that the scammer’s working for. The
money goes right into their pocket. 

Meanwhile, victims see something else entirely. Scammers give them step-by-step
instructions that cover what to invest, where, and how to conduct transactions
with cryptocurrency. The sums start small. First $5,000 or $10,000. The victim
checks in with their new investment “app” and sees a great gain. The process
repeats, as the sums get proverbially fatter and fatter. 

Finally, the truth comes out. Hard reality strikes when victims try to transfer
their cryptocurrency out of their app. They can’t. There’s nothing there. The
scammers manipulated the info on that bogus app. All the investments, all the
transaction history, and all the earnings — fake. 

And because the scammers did their dirty work in cryptocurrency, that money is
gone. Practically untraceable and practically impossible to get back.  

Clearly, “Jessica” followed this scam to the letter. However, it’s highly likely
“Jessica” didn’t work alone. 


PIG BUTCHERING SCAMS AND ORGANIZED CRIME. 

Organized crime props up the vast majority of pig butchering scams.  

The United States FBI points to several large-scale pig butchering operations,
centered mostly in Southeast Asia.ii Other findings point to operations in
Nigeria, where thousands of “Yahoo Boys” fire off romantic messages in their
form of a pig butchering ring.iii  

In another account, a Reuters Special Report traced $9 million to an account
registered to a well-connected representative of a Chinese trade group in
Thailand — which hinted at yet broader collusion and fraud. 

These are big-time scams, backed by big-time operations. They run like them
too. 

They have dev and design teams that create legit-looking finance apps. They have
even further trappings of a large, legitimate company, including support,
customer service, accounting, and the like to manage transactions. Then they
have their front-line operatives, the people doing the texting and messaging.  

However, many of these front-line scammers do it against their will. 

An even darker aspect of pig butchering scams reveals itself when you discover
who does the actual dirty work. As reported by the FBI, these front-line
scammers are often human trafficking victims: 

Criminal actors target victims, primarily in Asia, in employment fraud schemes
by posting false job advertisements on social media and online employment sites.
The schemes cover a wide range of opportunities, to include tech support, call
center customer service, and beauty salon technicians.  

Job seekers are offered competitive salaries, lucrative benefits, paid travel
expenses as well as room and board. Often throughout the process, the location
for the position is shifted from the advertised location. Upon job seekers’
arrival in the foreign country, criminal actors use multiple means to coerce
them to commit cryptocurrency investment schemes, such as confiscation of
passports and travel documents, threat of violence, and use of violence.iv 

The cruel fact of pig butchering scams is this: victims victimize victims. 

Meanwhile, organized crime operations get rich. One piece of academic research
traced $75.3 billion to one suspected pig butchering network alone between 2020
and 2024.v  

In the U.S., the FBI points to $2.57 billion in cryptocurrency and pig
butchering fraud reports in 2022.vi As always with such figures, many losses go
unreported. That figure climbs much higher. Yet higher still when it accounts
for victims worldwide. 


HOW TO PREVENT PIG BUTCHERING ATTACKS. 

Effective pig butchering requires that dossier we talked about before. A profile
of the victim that includes personal details siphoned from online sources. One
move that can lower your risk of becoming a target involves trimming down your
presence online.  

Steps include … 

Make your social media more private. Our new McAfee Social Privacy
Manager personalizes your privacy based on your preferences. It does the heavy
lifting by adjusting more than 100 privacy settings across your social media
accounts in only a few clicks. This makes sure that your personal info is only
visible to the people you want to share it with. It also keeps it out of search
engines where the public can see it. Including scammers. 

Watch what you post on public forums. As with social media, scammers harvest
info from online forums dedicated to sports, hobbies, interests, and the like.
If possible, use a screen name on these sites so that your profile doesn’t
immediately identify you. Likewise, keep your personal details to yourself. When
posted on a public forum, it becomes a matter of public record. Anyone,
including scammers, can look it up. 

Remove your info from data brokers that sell it. McAfee Personal Data
Cleanup helps you remove your personal info from many of the riskiest data
broker sites out there. Running it regularly can keep your name and
info off these sites, even as data brokers collect and post new info. Depending
on your plan, it can send requests to remove your data automatically.  

Delete your old accounts. Yet another source of personal info comes from data
breaches. Scammers use this info as well to complete a sharper picture of their
potential victims. With that, many internet users can have over 350 online
accounts, many of which they might not know are still active. McAfee Online
Account Cleanup can help you delete them. It runs monthly scans to find your
online accounts and shows you their risk level. From there, you can decide which
to delete, protecting your personal info from data breaches and your overall
privacy as a result. 


HOW TO STOP A PIG BUTCHERING ATTACK. 

Whether you think you’re a target or think you know someone who might be, you
can take immediate steps to stop a pig butchering attack. It begins with
awareness. Simply by reading this blog article, you’ve gained an understanding
of what these attacks are and how they work. Not to mention how costly they can
be.  

If you think something sketchy is going on, take the following steps: 

Ignore it. 

It’s that simple. The fact that a lot of these scams start over WhatsApp and
text messages means that the scammer either got your phone number online or they
targeted your number randomly. In either case, they count on your response. And
continued responses. In many cases, the initial contact is made by one person
and viable candidates are passed on to more seasoned scammers. Bottom line:
don’t interact with people you don’t know. No need to reply with “Sorry, wrong
number” or anything like that. Ignore these messages and move on. 

When a stranger you’ve just met online brings up money, consider it a scam. 

Money talk is an immediate sign of a scam. The moment a person you’ve never met
and got to know face to face asks for money, put an end to the conversation.
Whether they ask for money, bank transfers, cryptocurrency, money orders, or
gift cards, say no. And with pig butchering scams, never follow their directions
for making a specific investment with specific tools. Doing so only funnels
money into the scamming operation’s coffers. 

End the conversation. 

You might say no, and the scammer might back off — only to bring up the topic
again later. This is a sign to end the conversation. That persistence is a sure
sign of a scam. Recognize that this might be far easier said than done, as the
saying goes. Scammers horn their way into the lives of their victims. A budding
friendship or romance might be at stake. That’s what the scammers want you to
think. They play off emotions. Hard as it is, end the relationship. 

Talk with trusted friends or family members. And look out for them too. 

Sometimes it takes an extra set of eyes to spot a scammer. Conversations with
scammers won’t always add up. By talking about the people you meet online with
someone you trust can help you see when it doesn’t. Given the way that scammers
pull all kinds of strings on their victims, conversation — even to the point of
showing messages to a friend — can help clear up any clouded judgment.  


WITH ANYONE YOU MEET ONLINE, TAKE THINGS SLOWLY. 

Alarming as pig butchering stories sound, not every new person you meet online
is out to get you. For every “Jessica” out there, you’ll find far more genuine
people who really do want to strike up a friendship with you. Yet as these scams
increase, our guard must go up as well. 

It’s always been good advice to take a relationship slowly online. Scammers have
long taken advantage of people who rush to provide personal details and hand
over their trust. As with any confidence scam, look for people who want to have
a video call with you, meet in person in a public place, or otherwise give you
the chance to see that they’re a genuine person. And not a “Jessica.” 

Know those signs of a scam when you see them. And if they rear their head, act
on them. 

[i]
https://www.forbes.com/sites/cyrusfarivar/2022/09/09/pig-butchering-crypto-super-scam/?sh=7417db61ec8e

[ii] https://www.ic3.gov/Media/Y2023/PSA230522

[iii] https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4742235

[iv] https://www.ic3.gov/Media/Y2023/PSA230522

[v] https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4742235

[vi] https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf

INTRODUCING MCAFEE+

Download McAfee+ Now



Stay Updated

Follow us to stay updated on all things McAfee and on top of the latest consumer
and mobile security threats.


McAfee Blog Archives

We're here to make life online safe and enjoyable for everyone.


MORE FROM INTERNET SECURITY

Previous

5 THINGS ABOUT DOXING YOU SHOULD KNOW

Doxing can be harmful to one’s reputation and can cost someone their job, their
friends, or their...

Mar 13, 2024   |   8 MIN READ

15,000+ ROKU ACCOUNTS COMPROMISED — TAKE THESE STEPS TO PROTECT YOURSELF

Hackers used one of the oldest tricks in the book to turn a buck. All at the...

Mar 12, 2024   |   6 MIN READ

THE WHAT, WHY, AND HOW OF AI AND THREAT DETECTION

The nature of online threats is ever-changing, making it difficult for
antiquated threat detection systems to monitor...

Mar 07, 2024   |   6 MIN READ

HOW TO IDENTIFY AND PROTECT YOURSELF FROM VENMO SCAMS AND OTHER CASH APP SCAMS

Venmo, quick and convenient. A great way to pay back a friend or split the cost
of...

Mar 06, 2024   |   7 MIN READ

HOW TO PROTECT YOURSELF AGAINST AI VOICE CLONING ATTACKS

Imagine receiving a call from a loved one, only to discover it’s not them but a
convincing...

Apr 17, 2024   |   3 MIN READ

HOW DO YOU MANAGE YOUR SOCIAL MEDIA PRIVACY?

‘Ensure your privacy settings are set to the highest level’ – if you’ve been
reading my posts...

Apr 15, 2024   |   5 MIN READ

THE RISING THREAT OF SOCIAL MEDIA HARASSMENT. HERE’S HOW TO PROTECT YOURSELF.

Some conversations on social media can get … heated. Some can cross the line
into harassment. Or...

Apr 12, 2024   |   6 MIN READ

A FINANCE JOURNALIST FELL VICTIM TO A $50K VISHING SCAM – ARE YOU ALSO AT RISK?

In a world where digital communication dominates, the art of scamming has
evolved into a sophisticated game...

Apr 11, 2024   |   4 MIN READ

STAY CYBER SAVVY: YOUR 5-STEP GUIDE TO OUTSMARTING PHISHING SCAMS

In today’s digital landscape, distinguishing between legitimate communications
and phishing attempts can feel like navigating a labyrinth...

Apr 10, 2024   |   3 MIN READ

THE TOP TAX SCAMS OF 2024

While last-minute tax filers stare down the clock, scammers look for easy
pickings. Tax scams are in...

Apr 09, 2024   |   11 MIN READ

HOW TO AVOID SOLAR ECLIPSE SCAMS

Scammers are turning a buck on the eclipse. A rash of eclipse scams have
appeared online, many...

Apr 04, 2024   |   8 MIN READ

WATCH OUT FOR IRS SCAMS AND AVOID IDENTITY THEFT

It’s time to get those tax forms ready. But as users prepare to file, scammers
prepare to take advantage of...

Apr 01, 2024   |   6 MIN READ

5 THINGS ABOUT DOXING YOU SHOULD KNOW

Doxing can be harmful to one’s reputation and can cost someone their job, their
friends, or their...

Mar 13, 2024   |   8 MIN READ

15,000+ ROKU ACCOUNTS COMPROMISED — TAKE THESE STEPS TO PROTECT YOURSELF

Hackers used one of the oldest tricks in the book to turn a buck. All at the...

Mar 12, 2024   |   6 MIN READ

THE WHAT, WHY, AND HOW OF AI AND THREAT DETECTION

The nature of online threats is ever-changing, making it difficult for
antiquated threat detection systems to monitor...

Mar 07, 2024   |   6 MIN READ

HOW TO IDENTIFY AND PROTECT YOURSELF FROM VENMO SCAMS AND OTHER CASH APP SCAMS

Venmo, quick and convenient. A great way to pay back a friend or split the cost
of...

Mar 06, 2024   |   7 MIN READ

HOW TO PROTECT YOURSELF AGAINST AI VOICE CLONING ATTACKS

Imagine receiving a call from a loved one, only to discover it’s not them but a
convincing...

Apr 17, 2024   |   3 MIN READ

HOW DO YOU MANAGE YOUR SOCIAL MEDIA PRIVACY?

‘Ensure your privacy settings are set to the highest level’ – if you’ve been
reading my posts...

Apr 15, 2024   |   5 MIN READ

THE RISING THREAT OF SOCIAL MEDIA HARASSMENT. HERE’S HOW TO PROTECT YOURSELF.

Some conversations on social media can get … heated. Some can cross the line
into harassment. Or...

Apr 12, 2024   |   6 MIN READ

A FINANCE JOURNALIST FELL VICTIM TO A $50K VISHING SCAM – ARE YOU ALSO AT RISK?

In a world where digital communication dominates, the art of scamming has
evolved into a sophisticated game...

Apr 11, 2024   |   4 MIN READ

STAY CYBER SAVVY: YOUR 5-STEP GUIDE TO OUTSMARTING PHISHING SCAMS

In today’s digital landscape, distinguishing between legitimate communications
and phishing attempts can feel like navigating a labyrinth...

Apr 10, 2024   |   3 MIN READ

THE TOP TAX SCAMS OF 2024

While last-minute tax filers stare down the clock, scammers look for easy
pickings. Tax scams are in...

Apr 09, 2024   |   11 MIN READ

HOW TO AVOID SOLAR ECLIPSE SCAMS

Scammers are turning a buck on the eclipse. A rash of eclipse scams have
appeared online, many...

Apr 04, 2024   |   8 MIN READ

WATCH OUT FOR IRS SCAMS AND AVOID IDENTITY THEFT

It’s time to get those tax forms ready. But as users prepare to file, scammers
prepare to take advantage of...

Apr 01, 2024   |   6 MIN READ

5 THINGS ABOUT DOXING YOU SHOULD KNOW

Doxing can be harmful to one’s reputation and can cost someone their job, their
friends, or their...

Mar 13, 2024   |   8 MIN READ

15,000+ ROKU ACCOUNTS COMPROMISED — TAKE THESE STEPS TO PROTECT YOURSELF

Hackers used one of the oldest tricks in the book to turn a buck. All at the...

Mar 12, 2024   |   6 MIN READ

THE WHAT, WHY, AND HOW OF AI AND THREAT DETECTION

The nature of online threats is ever-changing, making it difficult for
antiquated threat detection systems to monitor...

Mar 07, 2024   |   6 MIN READ

HOW TO IDENTIFY AND PROTECT YOURSELF FROM VENMO SCAMS AND OTHER CASH APP SCAMS

Venmo, quick and convenient. A great way to pay back a friend or split the cost
of...

Mar 06, 2024   |   7 MIN READ

Next
 * 1
 * 2
 * 3

Back to top
 *  
 * 
 * 
 * 
 * 

--------------------------------------------------------------------------------


Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA

Products

McAfee+™ Individual
McAfee+™ Family
McAfee® Total Protection
McAfee® Antivirus
McAfee® Safe Connect
McAfee® PC Optimizer
McAfee® TechMaster
McAfee® Mobile Security


Resources

Antivirus
Free Downloads
Parental Controls
Malware
Firewall
Blogs
Activate Retail Card
McAfee Labs


Support

Customer Service
FAQs
Renewals
Support
Community


About

About McAfee
Careers
Contact Us
Newsroom
Investors
Legal Terms
Your Privacy Choices
System Requirements
Sitemap

--------------------------------------------------------------------------------

  United States / English Copyright © 2024 McAfee, LLC
Copyright © 2024 McAfee, LLC
United States / English

✓
Danke für das Teilen!
AddToAny
Mehr…



Feedback