www.mcafee.com
Open in
urlscan Pro
104.70.95.190
Public Scan
Submitted URL: https://mcafeeinc-mkt-prod2-t.adobe-campaign.com/r/?id=hd785a9ea,6fa1c6de,6fa1d0c9&e=cDE9RE0zMDAxNDkxJnAyPTIwMjRfMDRfMTdfUkVUX1BPQ19EeW5hbWljX05l...
Effective URL: https://www.mcafee.com/blogs/internet-security/what-are-pig-butchering-scams-and-how-do-they-work/
Submission: On April 17 via api from BE — Scanned from DE
Effective URL: https://www.mcafee.com/blogs/internet-security/what-are-pig-butchering-scams-and-how-do-they-work/
Submission: On April 17 via api from BE — Scanned from DE
Form analysis
4 forms found in the DOMhttps://www.mcafee.com/blogs
<form class="desktop-search-form-v2" action="https://www.mcafee.com/blogs">
<div><span class="search_icon_desktop"> <img src="/blogs/wp-content/themes/securingtomorrow-brillio/img/new-icons/search_icon_black.svg" alt="search grey icon"> </span></div>
<div class="desktop-search-div"><input class="dsk-search" autocomplete="off" name="s" type="text" placeholder="Search"></div>
</form>
https://www.mcafee.com/blogs
<form class="desktop-search-form" style="display: none;" action="https://www.mcafee.com/blogs">
<div class="desktop-search-div"><input class="dsk-search" autocomplete="off" name="s" type="text" placeholder="Type and hit enter..."></div>
<div><span class="close_icon_desktop"> <img src="https://www.mcafee.com/blogs/wp-content/themes/securingtomorrow-brillio/img/new-icons/cross-grey-icon.svg" alt="close grey icon"> </span></div>
</form>
https://www.mcafee.com/blogs
<form class="form-inline my-2 my-lg-0" action="https://www.mcafee.com/blogs">
<div class="input-group mb-3 search-div">
<div class="input-group-append"><button class="sarch-btn" type="button"><span class="fa fa-search" title="Type and hit enter..."><span style="display: none;">.</span></span> </button>
</div>
</div>
</form>
https://www.mcafee.com/blogs
<form action="https://www.mcafee.com/blogs" class="desktop-search-form" style="display: none;">
<div class="desktop-search-div">
<input class="dsk-search" name="s" type="text" placeholder="Type and hit enter..." autocomplete="off">
</div>
<div><span class="close_icon_desktop">
<img src="https://www.mcafee.com/blogs/wp-content/themes/securingtomorrow-brillio/img/new-icons/cross-grey-icon.svg" alt="close grey icon">
</span>
</div>
</form>
Text Content
* Products * All-In-One Protection * NEW McAfee+ Individual Plans Complete privacy, identity and device protection for individuals. * NEW McAfee+ Family Plans Complete privacy, identity and device protection for up to 6 family members. * Other Products & Services * Antivirus * Scam Protection * Virtual Private Network (VPN) * Mobile Security * PC Optimizer * TechMaster Concierge * McAfee Assist * Free Tools & Downloads * Web Protection * Free Antivirus Trial * Device Security Scan * Password Generator * Features * Keep Me Private Online * Personal Data Cleanup * Online Account Cleanup * VPN (Virtual Private Network) * Social Privacy Manager * Safeguard My Identity * Identity Monitoring * Credit Monitoring * Security Freeze * Identity Theft Coverage & Restoration * Password Manager * Protect My Devices * Antivirus * Scam Protection * Web Protection * Protect My Family * Protection Score * Parental Controls * Family Plans * Resources * Stay Updated * McAfee Blog * Reports and Guides * McAfee on YouTube * Prevent Spam and Phishing * Learn More * Learn at McAfee * What is Antivirus? * What is a VPN? * What is Identity Theft? * Press & News * McAfee Newsroom * AI News & Scams * About Us * Our Company * Company Overview * Awards & Reviews * Investors * Our Efforts * Inclusion & Diversity * Integrity & Ethics * Public Policy * Join Us * Careers * Life at McAfee * Our Teams * Our Locations * Why McAfee Products All-In-One Protection NEW McAfee+ Individual Plans Complete privacy, identity and device protection for individuals. NEW McAfee+ Family Plans Complete privacy, identity and device protection for up to 6 family members. Other Products & Services Antivirus Scam Protection Virtual Private Network (VPN) Mobile Security PC Optimizer TechMaster Concierge McAfee Assist Free Tools & Downloads Web Protection Free Antivirus Trial Device Security Scan Password Generator Features Keep Me Private Online Personal Data Cleanup Online Account Cleanup VPN (Virtual Private Network) Social Privacy Manager Safeguard My Identity Identity Monitoring Credit Monitoring Security Freeze Identity Theft Coverage & Restoration Password Manager Protect My Devices Antivirus Scam Protection Web Protection Protect My Family Protection Score Parental Controls Family Plans Resources Stay Updated McAfee Blog Reports and Guides McAfee on YouTube Prevent Spam and Phishing Learn More Learn at McAfee What is Antivirus? What is a VPN? What is Identity Theft? Press & News McAfee Newsroom AI News & Scams About Us Our Company Company Overview Awards & Reviews Investors Our Efforts Inclusion & Diversity Integrity & Ethics Public Policy Join Us Careers Life at McAfee Our Teams Our Locations Why McAfee Support Help Customer Support Support Community FAQs Contact Us Activation Activate Retail Card Region Asia Pacific Australia - English New Zealand - English Singapore - English Malaysia - English Philippines - English India - English 대한민국 - 한국어 日本 - 日本語 中国 - 简体中文 香港特別行政區 - 繁體中文 台灣 - 繁體中文 Europe Česká Republika - Čeština Danmark - Dansk Suomi - Suomi France - Français Deutschland - Deutsch Ελλάδα - Ελληνικά Ireland - English Magyarország - Magyar ישראל - עברית Italia - Italiano Nederland - Nederlands Norge - Bokmål Polska - Polski Portugal - Português Россия - Русский España - Español Sverige - Svenska Suisse - Français Schweiz - Deutsch Türkiye - Türkçe العربية - العربية United Kingdom - English North America United States - English Canada - English Canada - Français South America Argentina - Español Brasil - Português Chile - Español Colombia - Español México - Español Perú - Español Sign in * Support * Help * Customer Support * Support Community * FAQs * Contact Us * Activation * Activate Retail Card * * Asia Pacific * Australia-English * New Zealand-English * Singapore-English * Malaysia-English * Philippines-English * India-English * 대한민국-한국어 * 日本-日本語 * 中国-简体中文 * 香港特別行政區-繁體中文 * 台灣-繁體中文 * Europe * Česká Republika-Čeština * Danmark-Dansk * Suomi-Suomi * France-Français * Deutschland-Deutsch * Ελλάδα-Ελληνικά * Ireland-English * Magyarország-Magyar * ישראל-עברית * Italia-Italiano * Nederland-Nederlands * * Norge-Bokmål * Polska-Polski * Portugal-Português * Россия-Русский * España-Español * Sverige-Svenska * Suisse-Français * Schweiz-Deutsch * Türkiye-Türkçe * العربية-العربية * United Kingdom-English * North America * United States-English * Canada-English * Canada-Français * South America * Argentina-Español * Brasil-Português * Chile-Español * Colombia-Español * México-Español * Perú-Español * Sign in * * Blog * Topics How To Guides and Tutorials Internet Security Mobile Security Family Safety Privacy & Identity Protection Security News * At McAfee McAfee News Executive Perspectives McAfee Labs Life at McAfee Hackable? Podcast * English * Portuguese (BR) * Spanish * French(FR) * German * Italian * Japanese * French(CA) * Portuguese (PT) * Spanish (MX) * Dutch * * Blog * Topics How To Guides and Tutorials Internet Security Mobile Security Family Safety Privacy & Identity Protection Security News * At McAfee McAfee News Executive Perspectives McAfee Labs Life at McAfee Hackable? Podcast * . * Portuguese (BR) Spanish French(FR) German Italian Japanese French(CA) Portuguese (PT) Spanish (MX) Dutch Blog Internet Security What are Pig Butchering Scams and How Do They Work? WHAT ARE PIG BUTCHERING SCAMS AND HOW DO THEY WORK? McAfee Mar 08, 2024 13 MIN READ “Jessica” cost him one million dollars. In an account to Forbes, one man described how he met “Jessica” online.i Readily, they formed a friendship. Turns out, “Jessica” was a great listener, particularly as he talked about the tough times he was going through. Through chats on WhatsApp, he shared the struggles of supporting his family and rapidly ailing father. The story telegraphs itself. Yes, “Jessica” was a scammer. Yet this scam put a new twist on an old con game. The man fell victim to a pig butchering scam — a scam that weaves together long strings of messages, cryptocurrency, and bogus investment opportunities. Many victims lose everything. “Jessica’s” victim broke down the scam, how it worked, and how he got roped in. It began with an introductory text in October that spun into a WhatsApp transcript spanning 271,000 words. Throughout, he shared his family and financial struggles. Then, “Jessica” offered hope. Investments that would turn a fast buck. “Jessica” walked him through several transactions on an app he was told to download. Small investments at first, yet increasingly larger. “Jessica” needed him to invest more and more, despite his reservations. Yet his balance grew and grew each time he followed her explicit directions. Then, the trap sprung. Twice. In November, he logged into the app and found a negative balance close to half a million dollars. “Jessica” reassured him that he could get it back, and then some. “Jessica” encouraged him to borrow. He did. From his bank and a childhood friend. Soon, he was back up to nearly $2 million. Or so he thought. In December, he logged into the app once again and found a negative balance of $1 million. His savings and borrowed money alike disappeared — straight into the hands of scammers. All the while, they manipulated the app with a plug-in that fabricated financial results. His whopping gains were actually massive losses. He’s far from the only victim of pig butchering. Last year, we brought you the story of “Leslie,” a retired woman who fell victim to a different form of the same scam. A so-called friend she met online directed her to invest her retirement funds for even more returns. Soon, a lonely yet otherwise sharp retiree found herself down $100,000. Victims like these find themselves among the thousands of people who fall for pig butchering scams each year. The problem is global in scope, costing billions of dollars each year. Yet as pig butchering represents a new type of scam, it uses some age-old tricks to separate people from their money. With that, pig butchering scams are preventable. Awareness plays a major role, along with several other steps people can take to keep it from happening to them. WHAT’S A PIG BUTCHERING SCAM? It’s a con game with a vivid name. Just as a livestock farm raises pork for profit, scammers foster long-term relationships with their victims for profit. The scammers start by taking small sums of money, which increase over time, until the victim finally gets “fattened up” and “butchered” for one final whopping sum. The term appears to have origins in the Chinese phrase zhu zai, meaning “to slaughter a pig.” What sets pig butchering scams apart from romance scams, elder scams, and other con games is cryptocurrency. Scammers lure their victims into investing in ventures, seemingly profitable ones because the scammers appear to make the same investments themselves. With great success. Victims then mirror those investments, yet the “market” is rigged. With phony sites and apps, the scammers point to big gains — which are all mocked up on the screen. Instead, the money goes straight to them. The scam follows a script, one that “Jessica” played out to the letter. You can see the steps. It starts out innocently enough. A text on the phone, a note on a messaging app, or a direct message on social media comes to the victim from out of the blue. It’s from someone they don’t know, and they might ask a simple question, like … “Is this John? We shared a tee time at the course last week and I have that extra club I said I’d give you.” “Hi, Sally. It’s me. Sorry I can’t make lunch today. Can we reschedule?” Or even as simple as … “Hey.” These “wrong number” texts and messages are anything but unintended. In some cases, victims get randomly picked. Blasts of texts and messages get sent to broad audiences, all in the hope that a handful of potential victims will reply. Yet, by and large, victims get carefully selected. And researched. The scammers work from a dossier of info gathered on the victim, full of tidbits harvested from the victim’s online info and social media profiles. Who puts together those dossiers? Often, it’s a large, organized crime operation. The scammer behind the messages is only one part of a much larger scamming machine, which we’ll cover in a bit. With that intel in hand, the scammers have their opening. After an introduction, the scammer kicks off a conversation. Over time, the conversations get personal. And those personal touches have a way of luring people in. Scammers pose as another person, such as “Jessica,” sprinkle things into the conversation like similar interests or family backgrounds. Anything that’s just enough to intrigue the victim and keep them chatting. From there, scammers play a long con game, building trust with their victims over time. Things tend to get increasingly personal. The scammer pumps the victim for more and more news of their life. What they’re worried about. What dreams they have. And in cases where the scam takes a romantic turn, how they’ll build a life together. Then, money comes into play. With a solid read on their victims and their lives, scammers drop hints about investment opportunities with big returns. The scammer rarely takes the money themselves. In fact, they almost always insist that the victim handles the money themselves. Instead, scammers lure their victims into using bogus apps that look like they support a legitimate trading platform. Yet they’re not. These apps act as a direct line to the scamming operation that the scammer’s working for. The money goes right into their pocket. Meanwhile, victims see something else entirely. Scammers give them step-by-step instructions that cover what to invest, where, and how to conduct transactions with cryptocurrency. The sums start small. First $5,000 or $10,000. The victim checks in with their new investment “app” and sees a great gain. The process repeats, as the sums get proverbially fatter and fatter. Finally, the truth comes out. Hard reality strikes when victims try to transfer their cryptocurrency out of their app. They can’t. There’s nothing there. The scammers manipulated the info on that bogus app. All the investments, all the transaction history, and all the earnings — fake. And because the scammers did their dirty work in cryptocurrency, that money is gone. Practically untraceable and practically impossible to get back. Clearly, “Jessica” followed this scam to the letter. However, it’s highly likely “Jessica” didn’t work alone. PIG BUTCHERING SCAMS AND ORGANIZED CRIME. Organized crime props up the vast majority of pig butchering scams. The United States FBI points to several large-scale pig butchering operations, centered mostly in Southeast Asia.ii Other findings point to operations in Nigeria, where thousands of “Yahoo Boys” fire off romantic messages in their form of a pig butchering ring.iii In another account, a Reuters Special Report traced $9 million to an account registered to a well-connected representative of a Chinese trade group in Thailand — which hinted at yet broader collusion and fraud. These are big-time scams, backed by big-time operations. They run like them too. They have dev and design teams that create legit-looking finance apps. They have even further trappings of a large, legitimate company, including support, customer service, accounting, and the like to manage transactions. Then they have their front-line operatives, the people doing the texting and messaging. However, many of these front-line scammers do it against their will. An even darker aspect of pig butchering scams reveals itself when you discover who does the actual dirty work. As reported by the FBI, these front-line scammers are often human trafficking victims: Criminal actors target victims, primarily in Asia, in employment fraud schemes by posting false job advertisements on social media and online employment sites. The schemes cover a wide range of opportunities, to include tech support, call center customer service, and beauty salon technicians. Job seekers are offered competitive salaries, lucrative benefits, paid travel expenses as well as room and board. Often throughout the process, the location for the position is shifted from the advertised location. Upon job seekers’ arrival in the foreign country, criminal actors use multiple means to coerce them to commit cryptocurrency investment schemes, such as confiscation of passports and travel documents, threat of violence, and use of violence.iv The cruel fact of pig butchering scams is this: victims victimize victims. Meanwhile, organized crime operations get rich. One piece of academic research traced $75.3 billion to one suspected pig butchering network alone between 2020 and 2024.v In the U.S., the FBI points to $2.57 billion in cryptocurrency and pig butchering fraud reports in 2022.vi As always with such figures, many losses go unreported. That figure climbs much higher. Yet higher still when it accounts for victims worldwide. HOW TO PREVENT PIG BUTCHERING ATTACKS. Effective pig butchering requires that dossier we talked about before. A profile of the victim that includes personal details siphoned from online sources. One move that can lower your risk of becoming a target involves trimming down your presence online. Steps include … Make your social media more private. Our new McAfee Social Privacy Manager personalizes your privacy based on your preferences. It does the heavy lifting by adjusting more than 100 privacy settings across your social media accounts in only a few clicks. This makes sure that your personal info is only visible to the people you want to share it with. It also keeps it out of search engines where the public can see it. Including scammers. Watch what you post on public forums. As with social media, scammers harvest info from online forums dedicated to sports, hobbies, interests, and the like. If possible, use a screen name on these sites so that your profile doesn’t immediately identify you. Likewise, keep your personal details to yourself. When posted on a public forum, it becomes a matter of public record. Anyone, including scammers, can look it up. Remove your info from data brokers that sell it. McAfee Personal Data Cleanup helps you remove your personal info from many of the riskiest data broker sites out there. Running it regularly can keep your name and info off these sites, even as data brokers collect and post new info. Depending on your plan, it can send requests to remove your data automatically. Delete your old accounts. Yet another source of personal info comes from data breaches. Scammers use this info as well to complete a sharper picture of their potential victims. With that, many internet users can have over 350 online accounts, many of which they might not know are still active. McAfee Online Account Cleanup can help you delete them. It runs monthly scans to find your online accounts and shows you their risk level. From there, you can decide which to delete, protecting your personal info from data breaches and your overall privacy as a result. HOW TO STOP A PIG BUTCHERING ATTACK. Whether you think you’re a target or think you know someone who might be, you can take immediate steps to stop a pig butchering attack. It begins with awareness. Simply by reading this blog article, you’ve gained an understanding of what these attacks are and how they work. Not to mention how costly they can be. If you think something sketchy is going on, take the following steps: Ignore it. It’s that simple. The fact that a lot of these scams start over WhatsApp and text messages means that the scammer either got your phone number online or they targeted your number randomly. In either case, they count on your response. And continued responses. In many cases, the initial contact is made by one person and viable candidates are passed on to more seasoned scammers. Bottom line: don’t interact with people you don’t know. No need to reply with “Sorry, wrong number” or anything like that. Ignore these messages and move on. When a stranger you’ve just met online brings up money, consider it a scam. Money talk is an immediate sign of a scam. The moment a person you’ve never met and got to know face to face asks for money, put an end to the conversation. Whether they ask for money, bank transfers, cryptocurrency, money orders, or gift cards, say no. And with pig butchering scams, never follow their directions for making a specific investment with specific tools. Doing so only funnels money into the scamming operation’s coffers. End the conversation. You might say no, and the scammer might back off — only to bring up the topic again later. This is a sign to end the conversation. That persistence is a sure sign of a scam. Recognize that this might be far easier said than done, as the saying goes. Scammers horn their way into the lives of their victims. A budding friendship or romance might be at stake. That’s what the scammers want you to think. They play off emotions. Hard as it is, end the relationship. Talk with trusted friends or family members. And look out for them too. Sometimes it takes an extra set of eyes to spot a scammer. Conversations with scammers won’t always add up. By talking about the people you meet online with someone you trust can help you see when it doesn’t. Given the way that scammers pull all kinds of strings on their victims, conversation — even to the point of showing messages to a friend — can help clear up any clouded judgment. WITH ANYONE YOU MEET ONLINE, TAKE THINGS SLOWLY. Alarming as pig butchering stories sound, not every new person you meet online is out to get you. For every “Jessica” out there, you’ll find far more genuine people who really do want to strike up a friendship with you. Yet as these scams increase, our guard must go up as well. It’s always been good advice to take a relationship slowly online. Scammers have long taken advantage of people who rush to provide personal details and hand over their trust. As with any confidence scam, look for people who want to have a video call with you, meet in person in a public place, or otherwise give you the chance to see that they’re a genuine person. And not a “Jessica.” Know those signs of a scam when you see them. And if they rear their head, act on them. [i] https://www.forbes.com/sites/cyrusfarivar/2022/09/09/pig-butchering-crypto-super-scam/?sh=7417db61ec8e [ii] https://www.ic3.gov/Media/Y2023/PSA230522 [iii] https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4742235 [iv] https://www.ic3.gov/Media/Y2023/PSA230522 [v] https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4742235 [vi] https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf INTRODUCING MCAFEE+ Download McAfee+ Now Stay Updated Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats. McAfee Blog Archives We're here to make life online safe and enjoyable for everyone. MORE FROM INTERNET SECURITY Previous 5 THINGS ABOUT DOXING YOU SHOULD KNOW Doxing can be harmful to one’s reputation and can cost someone their job, their friends, or their... Mar 13, 2024 | 8 MIN READ 15,000+ ROKU ACCOUNTS COMPROMISED — TAKE THESE STEPS TO PROTECT YOURSELF Hackers used one of the oldest tricks in the book to turn a buck. All at the... Mar 12, 2024 | 6 MIN READ THE WHAT, WHY, AND HOW OF AI AND THREAT DETECTION The nature of online threats is ever-changing, making it difficult for antiquated threat detection systems to monitor... Mar 07, 2024 | 6 MIN READ HOW TO IDENTIFY AND PROTECT YOURSELF FROM VENMO SCAMS AND OTHER CASH APP SCAMS Venmo, quick and convenient. A great way to pay back a friend or split the cost of... Mar 06, 2024 | 7 MIN READ HOW TO PROTECT YOURSELF AGAINST AI VOICE CLONING ATTACKS Imagine receiving a call from a loved one, only to discover it’s not them but a convincing... Apr 17, 2024 | 3 MIN READ HOW DO YOU MANAGE YOUR SOCIAL MEDIA PRIVACY? ‘Ensure your privacy settings are set to the highest level’ – if you’ve been reading my posts... Apr 15, 2024 | 5 MIN READ THE RISING THREAT OF SOCIAL MEDIA HARASSMENT. HERE’S HOW TO PROTECT YOURSELF. Some conversations on social media can get … heated. Some can cross the line into harassment. Or... Apr 12, 2024 | 6 MIN READ A FINANCE JOURNALIST FELL VICTIM TO A $50K VISHING SCAM – ARE YOU ALSO AT RISK? In a world where digital communication dominates, the art of scamming has evolved into a sophisticated game... Apr 11, 2024 | 4 MIN READ STAY CYBER SAVVY: YOUR 5-STEP GUIDE TO OUTSMARTING PHISHING SCAMS In today’s digital landscape, distinguishing between legitimate communications and phishing attempts can feel like navigating a labyrinth... Apr 10, 2024 | 3 MIN READ THE TOP TAX SCAMS OF 2024 While last-minute tax filers stare down the clock, scammers look for easy pickings. Tax scams are in... Apr 09, 2024 | 11 MIN READ HOW TO AVOID SOLAR ECLIPSE SCAMS Scammers are turning a buck on the eclipse. A rash of eclipse scams have appeared online, many... Apr 04, 2024 | 8 MIN READ WATCH OUT FOR IRS SCAMS AND AVOID IDENTITY THEFT It’s time to get those tax forms ready. But as users prepare to file, scammers prepare to take advantage of... Apr 01, 2024 | 6 MIN READ 5 THINGS ABOUT DOXING YOU SHOULD KNOW Doxing can be harmful to one’s reputation and can cost someone their job, their friends, or their... Mar 13, 2024 | 8 MIN READ 15,000+ ROKU ACCOUNTS COMPROMISED — TAKE THESE STEPS TO PROTECT YOURSELF Hackers used one of the oldest tricks in the book to turn a buck. All at the... Mar 12, 2024 | 6 MIN READ THE WHAT, WHY, AND HOW OF AI AND THREAT DETECTION The nature of online threats is ever-changing, making it difficult for antiquated threat detection systems to monitor... Mar 07, 2024 | 6 MIN READ HOW TO IDENTIFY AND PROTECT YOURSELF FROM VENMO SCAMS AND OTHER CASH APP SCAMS Venmo, quick and convenient. A great way to pay back a friend or split the cost of... Mar 06, 2024 | 7 MIN READ HOW TO PROTECT YOURSELF AGAINST AI VOICE CLONING ATTACKS Imagine receiving a call from a loved one, only to discover it’s not them but a convincing... Apr 17, 2024 | 3 MIN READ HOW DO YOU MANAGE YOUR SOCIAL MEDIA PRIVACY? ‘Ensure your privacy settings are set to the highest level’ – if you’ve been reading my posts... Apr 15, 2024 | 5 MIN READ THE RISING THREAT OF SOCIAL MEDIA HARASSMENT. HERE’S HOW TO PROTECT YOURSELF. Some conversations on social media can get … heated. Some can cross the line into harassment. Or... Apr 12, 2024 | 6 MIN READ A FINANCE JOURNALIST FELL VICTIM TO A $50K VISHING SCAM – ARE YOU ALSO AT RISK? In a world where digital communication dominates, the art of scamming has evolved into a sophisticated game... Apr 11, 2024 | 4 MIN READ STAY CYBER SAVVY: YOUR 5-STEP GUIDE TO OUTSMARTING PHISHING SCAMS In today’s digital landscape, distinguishing between legitimate communications and phishing attempts can feel like navigating a labyrinth... Apr 10, 2024 | 3 MIN READ THE TOP TAX SCAMS OF 2024 While last-minute tax filers stare down the clock, scammers look for easy pickings. Tax scams are in... Apr 09, 2024 | 11 MIN READ HOW TO AVOID SOLAR ECLIPSE SCAMS Scammers are turning a buck on the eclipse. A rash of eclipse scams have appeared online, many... Apr 04, 2024 | 8 MIN READ WATCH OUT FOR IRS SCAMS AND AVOID IDENTITY THEFT It’s time to get those tax forms ready. But as users prepare to file, scammers prepare to take advantage of... Apr 01, 2024 | 6 MIN READ 5 THINGS ABOUT DOXING YOU SHOULD KNOW Doxing can be harmful to one’s reputation and can cost someone their job, their friends, or their... Mar 13, 2024 | 8 MIN READ 15,000+ ROKU ACCOUNTS COMPROMISED — TAKE THESE STEPS TO PROTECT YOURSELF Hackers used one of the oldest tricks in the book to turn a buck. All at the... Mar 12, 2024 | 6 MIN READ THE WHAT, WHY, AND HOW OF AI AND THREAT DETECTION The nature of online threats is ever-changing, making it difficult for antiquated threat detection systems to monitor... Mar 07, 2024 | 6 MIN READ HOW TO IDENTIFY AND PROTECT YOURSELF FROM VENMO SCAMS AND OTHER CASH APP SCAMS Venmo, quick and convenient. A great way to pay back a friend or split the cost of... Mar 06, 2024 | 7 MIN READ Next * 1 * 2 * 3 Back to top * * * * * -------------------------------------------------------------------------------- Corporate Headquarters 6220 America Center Drive San Jose, CA 95002 USA Products McAfee+™ Individual McAfee+™ Family McAfee® Total Protection McAfee® Antivirus McAfee® Safe Connect McAfee® PC Optimizer McAfee® TechMaster McAfee® Mobile Security Resources Antivirus Free Downloads Parental Controls Malware Firewall Blogs Activate Retail Card McAfee Labs Support Customer Service FAQs Renewals Support Community About About McAfee Careers Contact Us Newsroom Investors Legal Terms Your Privacy Choices System Requirements Sitemap -------------------------------------------------------------------------------- United States / English Copyright © 2024 McAfee, LLC Copyright © 2024 McAfee, LLC United States / English ✓ Danke für das Teilen! AddToAny Mehr… Feedback