Phishing Protection

Go back to Topic Center

Warnings on How One Could Become a Victim of ID Theft


You can fall victim to identity theft in the following ways:

  • Accessing the Internet from an unsecured PC. Without a security layer between your PC and the Internet, you invite hackers to steal your identity, destroy your files, or use your PC to attack others.
  • Obtaining potentially unwanted programs (PUPs) on your PC. Malicious PUPs such as spyware or adware may monitor your keystrokes, track your Internet logins, transmit your confidential information, or redirect your browser to fake sites.
  • Sending personal identification information over the Internet. Hackers can easily retrieve sensitive data that is sent over an unsecured Internet connection.
  • Downloading files from friends and family or accepting unknown emails. You can obtain a virus, worm, or Trojan simply by accepting files from your friends, family, or others.
  • Not recognizing phishing scams or spam. Phishing scams use fraudulent emails and web sites to lure unsuspecting users into revealing private account or login information.
  • Leaving your wireless network unsecured. Since your wireless network’s radio waves travel through walls, a hacker with a simple antenna could attack you from miles away to steal your information or to launch attacks from your PC.

Back to top


The Ultimate Security:

McAfee® Mobile Security 

McAfee® Mobile Security

Connect with confidence and protect your most personal device


PC Infected? Get Expert Help Now!

McAfee Virus Removal Service 

Connect to one of our security experts by phone. Have your PC fixed remotely – while you watch!


Available daily, 24x7.