www.mcafee.com Open in urlscan Pro
23.79.137.72  Public Scan

Submitted URL: http://download.mcafee.com/
Effective URL: https://www.mcafee.com/en-us/antivirus.html
Submission: On November 05 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Loading...
McAfee
 * Total Protection
 * Antivirus
 * Identity
 * VPN
 * About
   
    * Our Company
      
      * Awards and Reviews
      * About Us
      * Executive Team
      * Newsroom
   
    * Our Efforts
      
      * Inclusion & Diversity
      * Integrity & Ethics
      * Public Policy
      * McAfee Labs Threat Center
   
    * Join Us
      
      * Search Job Openings
      * Life at McAfee
      * Our Teams
      * Our Locations

 * Support
   
    * Help
      
      * Consumer Support
      * Community
      * Activate your Retail Card
   
    * Learn more about Security
      
      * Free Antivirus Trial
      * Malware
      * Firewall
      * Safe Browser
      * VPN for Phones
      * Parental Controls
      * Mobile Security
   
    * More Resources
      
      * 2020 Mobile Threat Report
      * Press Pause on Risky Downloads
      * Most Dangerous Celebrity Searches
      * Supporting You and Your Community
      * Hackable? Podcast
      * Safety Tips

 * Investors

 * Blog
 * Login
 * More
     ×
   * My Account
   * Activate your Retail Card
   * Safe Browser
   * Gaming Antivirus
   * TechMaster Concierge
   * Identity Protection Service
   * Free Downloads
   * McAfee Enterprise




MCAFEE® ANTIVIRUS

McAfee® Total Protection is antivirus purpose-built to detect and destroy
threats like viruses, malware, ransomware, spyware and others.

$49.99*



$124.99 ($75.00 OFF)

Introductory Pricing for New Customers

Get protection now
Download free trial

*Price shown is for first year. See offer details below.




Windows® | macOS® | Android™ | iOS®


STAYING SECURE GOES FAR BEYOND ANTIVIRUS

 

Today’s savvy connected consumer lives in an on-demand world and understands
that staying secure goes far beyond antivirus. Cybercriminals lurk not only in
the darkest corners of the internet, but also in your neighborhood coffee shop.
But as these malicious players evolve, so do we. From leading antivirus
capabilities, to online web protection & on-the-go personal VPN, we’ll give you
the tools to stand tall in the face of these would-be cybercriminals so you can
live your digital life to the fullest.

With that, we invite you to get informed, and then get McAfee. We’re with you.

Family Individual


ALL PRODUCTS INCLUDE:

 Award-winning Antivirus

Protect your computer and personal information from hackers and criminals

 Firewall

Secure your firewall and block hackers from accessing your home network

 Password manager

Securely store and manage all your online passwords in a single location

 File Shredder

Delete sensitive files completely to ensure no traces are left behind

 Identity Protection Service

Monitor up to 10 email addresses and get expanded monitoring with auto-renewal
turned on.

 Expert security support

Get technical assistance and peace of mind from our dedicated team and support
knowledge-base

 Safe Browsing

Browse confidently knowing risky sites will be blocked

 PC Optimization

Automated tools that help improve performance for resource-hungry apps and free
up bandwidth while you’re browsing


PLUS

5 Devices

1yr Subscription

$39.99*

Buy now


PREMIUM

10 Devices

1yr Subscription

$49.99*

Buy now

Best Value!


ULTIMATE

Unlimited Devices

1yr Subscription

$69.99*

Buy now
  Secure VPN: 5 licenses

Available when you’re enrolled in auto-renewal, keep your personal information
and online habits private with our bank-grade encryption

500 MB**

500 MB**

Unlimited

  Multi-device compatibility

Protect up to 5 of your compatible Windows, Mac OS, iOS and Android devices




  Parental Controls

Protect the entire household using a single subscription; get peace of mind
knowing your kids are protected online

 


  Identity theft insurance

Gain access to identity theft insurance and limited power-of-attorney
restoration services on top of identity monitoring, for all-round peace-of-mind.

 
 



ALL PRODUCTS INCLUDE:

 Award-winning Antivirus

Protect your computer and personal information from hackers and criminals

 Firewall

Secure your firewall and block hackers from accessing your home network

 Password manager

Securely store and manage all your online passwords in a single location

 File Shredder

Delete sensitive files completely to ensure no traces are left behind

 Identity Protection Service

Monitor up to 10 email addresses and get expanded monitoring with auto-renewal
turned on.

 Expert security support

Get technical assistance and peace of mind from our dedicated team and support
knowledge-base

 Safe Browsing

Browse confidently knowing risky sites will be blocked

 PC Optimization

Automated tools that help improve performance for resource-hungry apps and free
up bandwidth while you’re browsing


BASIC

1 Device

1yr Subscription

$34.99*

Buy now
  Secure VPN: 1 license

Available when you’re enrolled in auto-renewal, keep your personal information
and online habits private with our bank-grade encryption

Req. Auto-renewal

Plus | Premium | Ultimate


PLUS

$39.99*

5 Devices

1yr Subscription

Buy now
 * Secure VPN (with auto-renewal)
 * Multi-device compatibility

 Secure VPN (with auto-renewal)

Available when you’re enrolled in auto-renewal, keep your personal information
and online habits private with our bank-grade encryption

 Multi-device compatibility

Protect up to 10 of your compatible Windows, Mac OS, iOS and Android devices

 Award-winning Antivirus

Protect your computer and personal information from hackers and criminals

 Firewall

Secure your firewall and block hackers from accessing your home network

 Password manager

Securely store and manage all your online passwords in a single location

 File Shredder

Delete sensitive files completely to ensure no traces are left behind

 Identity Protection Service

Monitor up to 10 email addresses and get expanded monitoring with auto-renewal
turned on.

 Expert security support

Get technical assistance and peace of mind from our dedicated team and support
knowledge-base

 Safe Browsing

Browse confidently knowing risky sites will be blocked

 PC Optimization

Automated tools that help improve performance for resource-hungry apps and free
up bandwidth while you’re browsing


PREMIUM

$49.99*

10 Devices

1yr Subscription

Buy now
 * Secure VPN (with auto-renewal)
 * Multi-device compatibility
 * Parental Controls

 Secure VPN (with auto-renewal)

Available when you’re enrolled in auto-renewal, keep your personal information
and online habits private with our bank-grade encryption

 Multi-device compatibility

Protect up to 10 of your compatible Windows, Mac OS, iOS and Android devices

 Parental Controls

Protect the entire household using a single subscription; get peace of mind
knowing your kids are protected online

 Award-winning Antivirus

Protect your computer and personal information from hackers and criminals

 Firewall

Secure your firewall and block hackers from accessing your home network

 Password manager

Securely store and manage all your online passwords in a single location

 File Shredder

Delete sensitive files completely to ensure no traces are left behind

 Identity Protection Service

Monitor up to 10 email addresses and get expanded monitoring with auto-renewal
turned on.

 Expert security support

Get technical assistance and peace of mind from our dedicated team and support
knowledge-base

 Safe Browsing

Browse confidently knowing risky sites will be blocked

 PC Optimization

Automated tools that help improve performance for resource-hungry apps and free
up bandwidth while you’re browsing

BEST VALUE


ULTIMATE

$69.99*

Unlimited Devices

1yr Subscription

Buy now

BEST VALUE

 * Secure VPN
 * Multi-device compatibility
 * Parental Controls
 * Identity protection

 Secure VPN

Available when you’re enrolled in auto-renewal, keep your personal information
and online habits private with our bank-grade encryption

 Multi-device compatibility

Protect up to 10 of your compatible Windows, Mac OS, iOS and Android devices

 Parental Controls

Protect the entire household using a single subscription; get peace of mind
knowing your kids are protected online

Identity protection

Monitor up to 10 email addresses and get expanded monitoring with auto-renewal
turned on.

 Award-winning Antivirus

Protect your computer and personal information from hackers and criminals

 Firewall

Secure your firewall and block hackers from accessing your home network

 Password manager

Securely store and manage all your online passwords in a single location

 File Shredder

Delete sensitive files completely to ensure no traces are left behind

 Identity Protection Service

Monitor up to 10 email addresses and get expanded monitoring with auto-renewal
turned on.

 Expert security support

Get technical assistance and peace of mind from our dedicated team and support
knowledge-base

 Safe Browsing

Browse confidently knowing risky sites will be blocked

 PC Optimization

Automated tools that help improve performance for resource-hungry apps and free
up bandwidth while you’re browsing


ALL PRODUCTS INCLUDE

Award-winning Antivirus

Firewall

Password manager

File Shredder

Encrypted Storage

Expert security support

Safe Browsing

PC Optimization


BASIC

$34.99*

1 Device

1yr Subscription

Buy now
 * Secure VPN (with auto-renewal)

 Secure VPN (with auto-renewal)

Available when you’re enrolled in auto-renewal, keep your personal information
and online habits private with our bank-grade encryption

 Award-winning Antivirus

Protect your computer and personal information from hackers and criminals

 Firewall

Secure your firewall and block hackers from accessing your home network

 Password manager

Securely store and manage all your online passwords in a single location

 File Shredder

Delete sensitive files completely to ensure no traces are left behind

 Identity Protection Service

Monitor up to 10 email addresses and get expanded monitoring with auto-renewal
turned on.

 Expert security support

Get technical assistance and peace of mind from our dedicated team and support
knowledge-base

 Safe Browsing

Browse confidently knowing risky sites will be blocked

 PC Optimization

Automated tools that help improve performance for resource-hungry apps and free
up bandwidth while you’re browsing


ALL PRODUCTS INCLUDE

Award-winning Antivirus

Firewall

Password manager

File Shredder

Encrypted Storage

Expert security support

Safe Browsing

PC Optimization


LOOKING FOR MORE AFFORDABLE PROTECTION?
WE GOT YOU COVERED!


ANTIVIRUS PLUS

Up to

1yr Subscription

$29.99*

Buy now


ANTIVIRUS PLUS:

One-year subscription for trusted anti-virus and privacy protection for up to 10
devices.

 Award-winning Antivirus

Protect your computer and personal information from hackers and criminals

 Expert security support

Get technical assistance and peace of mind from our dedicated team and support
knowledge-base

 Safe Browsing

Browse confidently knowing risky sites will be blocked

 PC Optimization

Automated tools that help improve performance for resource-hungry apps and free
up bandwidth while you’re browsing


ANTIVIRUS PLUS

Up to

1yr Subscription

$29.99*

Buy now

*First year price. Introductory Pricing for New Customers. See offer details.


JUMP TO A SPECIFIC ARTICLE:

 

 Protecting your data

 Free vs paid antivirus

 Avoiding fake antivirus software

 Knowing when a site is spoofed

 How to know if you’ve been hacked

 "Personal" Protection

 About computer viruses

 Scan using McAfee antivirus

 Our Virus Protection Pledge

 Frequently Asked Questions


PROTECTING YOUR DATA

The ubiquity of mobile phones has created a unique opportunity for
cybercriminals. Through malicious (though seemingly harmless) apps, these
criminals can access both financial and personal information without us
realizing it. Just a handful of malicious apps masquerading as legitimate apps
can do serious damage in a hurry. Protecting your mobile device with antivirus
software can help you steer clear of these threats and keep both your money and
personal data safer.

Learn more about McAfee Mobile Protection for Android
Learn more about McAfee Mobile Protection for iOS

 

Back to top 


FREE VS PAID ANTIVIRUS

Usually free antivirus software offers baseline malware protection that may not
be sufficient to combat the ever-evolving threat landscape, particularly when it
comes to the wide variety of zero-day threats and/or digital threats that go
beyond just antivirus. Rest assured that with our free 30-day trial you’ll get
all the features of our flagship McAfee® Total Protection suite, including
antivirus, web protection, password manager, file encryption and more. Take
advantage of our free trial and gain greater peace of mind every time you use
your devices.

Learn more about – McAfee antivirus free trial
Learn more about – McAfee premium antivirus

Additional tools: Virus Removal Service

Back to top 


AVOIDING FAKE ANTIVIRUS SOFTWARE

 

Fake antivirus software is one of the most persistent threats on the internet
today. Masquerading as legitimate antivirus software, fake antivirus software is
in fact a malicious program that extorts money from you to “fix” your computer.
And often, this new “antivirus” program disables legitimate security software
that you already have, exposing you to real threats.

These rogue programs try to hook you while you’re browsing the web by displaying
a popup window that warns you that your computer may be infected, and that you
need to download (fake) security software to fix the problem. This type of
software is often referred to as “scareware” since the pop-ups use messages like
“You have a virus,” as a way to get you to click.

Most of us are eager to get rid of any potential problems as quickly as
possible, which in turn has made the bad guys who make fake antivirus software
so successful. Once you agree to the purchase, the cybercriminals end up with
your credit card details and other personal information, and you get nothing but
malware in return.

Back to top 

KNOWING WHEN A SITE IS SPOOFED

Scammers trying to phish your personal information have extremely sophisticated
tools that help disguise malicious websites to look nearly identical to their
legitimate shopping, banking or even government counterparts, complete with
stolen company logos and site designs. The aim is to trick you into entering
your credit card details or banking login info into the fake site. To avoid
falling for this, go directly to the source by typing the address of a website
directly into the address bar of your browser instead of following a link from
an email or internet search. If you receive any suspicious links in your email,
checking the domain (or .com that it was sent from) is usually a good way to
tell if the source is legitimate or not. With McAfee® WebAdvisor, you can
sidestep malicious sites with clear warnings of risky websites, links and file
downloads.

Back to top 

HOW TO KNOW IF YOU’VE BEEN HACKED

Depending on the type of infection, your device may exhibit varying behavior.
For example:

 1. Filled screen – a screen that’s become filled with a matrix of numbers or
    skull-and-crossbones accompanied by ransom instructions are consistent with
    being infected by ransomware. 
 2. Spikes in Data Usage - if your data usage is increasing but you're not sure
    why, malware may be to blame. This could mean that a program is running in
    the background, likely stealing your information and transmitting it back to
    cybercriminals.  
 3. Browser pop-ups – while pop-up ads for the most part aren't harmful (just
    annoying), if you’re seeing these ads when your browser is closed, you could
    be dealing with malware.  
 4. Overheating – phones and computers are high-performance devices, but if your
    device unexpectedly gets hot and you’re not doing anything intensive or
    charging the device, it’s possible that malware could be stealing
    performance from that device and using those resources for cryptomining or
    other nefarious acts. 
 5. Faster Battery Drain – similar to overheating, if your battery life becomes
    unexpectedly short, it could be because malware is running in the background
    and draining your power.  

In all these cases, there’s a strong possibility you’ve been hacked. The sad
truth is that hackers now have a multitude of ways to get into your devices,
without ever touching them.

With access to your computer, hackers could retrieve your passwords and open the
door to your accounts. For example, an intruder could sign in to your accounts
as you, spam your contacts with phishing attacks, add new mobile lines or
even request credit cards. That’s why it’s important to be able to recognize
when your PC or phone has been hacked, especially since some of the signs can be
subtle.

The good news is that many of these attacks can be avoided with a strong
security software that’s purpose-built for that device to detect and
remove these threats before they can attack, whether it’s a Windows PC, Mac, iOS
device or Android device.

Back to top 

“PERSONAL” PROTECTION

Adopting a more complete security solution goes beyond strictly PC antivirus.
Protecting the expansive aspects of your digital life covers a wide spectrum of
devices – including your PCs, Macs, iOS devices and Android devices – all of
which are key pillars supporting your connected lifestyle. Strong security
software that provides the right level of protection for each device is a great
start to ensuring your busy life is protected, and more importantly,
uninterrupted.

But life doesn’t start and end with devices alone. Having personal protection
also involves your identity and privacy, particularly when it comes to the
services you trust with your personal information and your data going to and
from the internet. Adopting a VPN solution, regularly deleting cookies and
adopting an identity monitoring service can all help to stay on top of your
identity and privacy that extends beyond your devices. While you can control
your security and best practices, unfortunately, you don’t have much control
over what happens to your data on the internet, nor can you control when
companies that you entrust your data to may get breached and leak personal info
onto marketplaces like those in the Dark Web.

Learn more about how McAfee Total Protection provides personal protection

Back to top 

ABOUT COMPUTER VIRUSES
 

A computer virus is code that when executed is designed to enter a computer and
replicate itself. Viruses that are designed to harm a computer are classified as
a type of “malware”. The nefarious aims of different types of malware are
wide-ranging, including but not limited to:
 

Ransomware that encrypts sensitive files, photos and documents and your
computer, requiring you to make a payment (often via Bitcoin) to receive a
password to decrypt and unlock these files.  Trojan horses that enable a hacker
to completely take over your computer and execute programs as if they were
actually using your keyboard and mouse  Spyware that “mines” personal
information from your computer, selling it off to the highest bidder  Adware
that generates unintended pop-ups from shady advertisers 

 

Back to top 

SCAN USING MCAFEE ANTIVIRUS

McAfee antivirus offers a variety of ways to scan for threats. Real-time
scanning, when turned on, scans files whenever they are accessed, which helps to
protect your computer while you are using it, while keeping resource consumption
to a minimum. On-demand scanning provides flexibility to scan comprehensively or
selectively. You can access these scans within the product itself (via Quick
Scan or Full Scan) or by right clicking on a file/folder to scan specific items.

Steps to get started

Real-Time (On-Access) Scanning - Files are scanned whenever they are accessed

 1. Double-click and open your McAfee antivirus software 
 2. Click on the PC Security tab 
 3. Click Real-Time Scanning (it should be on by default) 
 4. Click Turn Off or Turn On to change the setting 

On-Demand Scanning - Start a scan of your drives and folders instantly

 1. Double-click and open your McAfee antivirus software
 2. Click the Scan for viruses button
 3. Click either Run a quick scan or Run a full scan, depending on your
    preference
    

Scheduled Scanning - Configure On-Demand scans to run at a particular time, or
on a regular basis

 1. Double-click and open your McAfee antivirus software 
 2. Click on the PC Security tab 
 3. Click Scheduled scans 
 4. Choose when and how often you want the regular scan to occur 
 5. Click Apply once you’ve setup your desired scan schedule 
 6. The scan will run at the scheduled time(s) 

 

Back to top 

OUR VIRUS PROTECTION PLEDGE

When you purchase a qualifying McAfee antivirus suite and opt-in for automatic
renewal, you will gain access to our Virus Protection Pledge. With this, you
have our 100% Guarantee that if a supported device gets a virus, a McAfee expert
will remove it, and if we can’t, we will offer a refund on your purchase price.
From the moment you subscribe, you can rest easy knowing that we’re here to help
keep your devices virus-free with our multi-layered protection. Additional terms
apply.

Back to top 



FREQUENTLY ASKED QUESTIONS


WHAT IS ANTIVIRUS?

An antivirus is software that protects against computer viruses, a type of
malware that self-replicates by inserting its code into other software programs.
The best antivirus programs scan files to protect your computer and devices from
such threats, while keeping resource consumption to a minimum.


WHAT IS THE DIFFERENCE BETWEEN MALWARE AND A VIRUS?

Malware is a term for any type of malicious software, regardless of how it
works, its intent or how it’s distributed. A virus is a specific type of malware
that self-replicates by inserting its code into other programs. 


WHAT IS FILELESS MALWARE?

Fileless malware is a type of malicious software that uses legitimate programs
to infect a computer. It does not rely on files and leaves no footprint, making
it challenging to detect and remove. Modern adversaries know the strategies
organizations use to try to block their attacks, and they’re crafting
increasingly sophisticated, targeted malware to evade defenses. It’s a race
against time, as the most effective hacking techniques are usually the newest
ones. Fileless malware has been effective in evading all but the most
sophisticated security solutions.


WHAT IS RANSOMWARE?

Ransomware is a type of malware that infects a device in order to encrypt its
data, locking it so that it can only be freed if the owner of the device pays
the cybercriminal a ransom, typically demanded in Bitcoin. It can prevent you
from using your computer or mobile device, opening your files or running certain
applications. Or, it could lock down personal data like photos, documents and
videos, holding them hostage until you pay up.


WHAT IS SCAREWARE?

Scareware is a trick to scare us into thinking that our computers or smartphones
have become infected with malware to get us to purchase a fake application. The
programs and unethical advertising practices hackers use to frighten users into
purchasing rogue applications are called scareware.

In a typical scareware scam, you might see an alarming popup message while
browsing the Web that says “Warning: Your computer is infected!” or “You have a
virus!” You would typically see these messages if you accidentally clicked on a
dangerous banner ad or link or visited a compromised website. The cybercriminals
are hoping that you click on the link in the popup message to “run a free scan”
and then purchase their phony antivirus software to get rid of the nonexistent
problems.


WHAT IS BROWSER HIJACKING?

Browser hijacking is when your Internet browser (eg. Chrome, FireFox, Internet
Explorer) settings are modified. Your default home or search page might get
changed or you might get a lot of advertisements popping up on your computer.
This is done through malicious software (malware) called hijackware. A browser
hijacker is usually installed as a part of freeware, but it can also be
installed on your computer if you click on an attachment in an  email, visit an
infected site (also known as a drive-by download) or download something from a
file-sharing site.

Once your browser has been hijacked, the cybercriminal can do a lot of damage.
The program can change your home page to a malicious website, crash your browser
or install spyware. Browser hijackers impede your ability to surf the web as you
please.


WHAT IS A TROJAN HORSE?

A Trojan horse (or Trojan) is one of the most common and dangerous types of
threats that can infect your computer or mobile device. Trojans are usually
disguised as benign or useful software that you download from the Internet, but
they actually carry malicious code designed to do harm—thus their name.

There are a variety of types of Trojans, many of which can launch sophisticated
and clever attacks. some types to be aware of are Password-stealing Trojans,
Remote access Trojans, Destructive Trojans, and Antivirus killers. 

A Trojan can have one or multiple destructive uses—that is what makes them so
dangerous. It’s also important to realize that unlike viruses, Trojans are not
self-replicating and are only spread by users who mistakenly download them,
usually from an email attachment or by visiting an infected site.


WHAT IS THE DIFFERENCE BETWEEN PHISHING AND PHARMING?

The word pharming is actually a mash-up of the words phishing and farming.
Phishing is when a hacker uses an email, text or social media post asking for
your personal and financial information. On the other hand, pharming doesn’t
require a lure. Instead of fishing for users, the hacker just sets up a fake
website, similar to farming a little plot of land, and users willingly and
unknowingly come to them and give them information.

How does it work? Most hackers use a method called DNS cache poisoning. A DNS,
or domain name system, is an Internet naming service that translates meaningful
website names you enter in (like twitter.com) into strings of numbers for your
computer to read (like 173.58.9.14). The computer then takes you to the website
you want to go to. In a pharming attack, the hacker poisons the DNS cache by
changing the string of numbers for different websites to ones for the hacker’s
fake website(s). This means that even if you type in the correct web address,
you will be redirected to the fake website.

Now, you go to the site and thinking that it is a legitimate site, you enter
your credit card information or passwords. Now, the hacker has that information
and you are at risk for identity theft and financial loss.


WHAT IS A KEYLOGGER?

A keylogger (short for keystroke logger) is software that tracks or logs the
keys struck on your keyboard, typically in a covert manner so that you don’t
know that your actions are being monitored. This is usually done with malicious
intent to collect your account information, credit card numbers, user names,
passwords and other private data.


WHAT IS TYPOSQUATTING?

Typosquatting, also known as URL hijacking, is a form of cybersquatting (sitting
on sites under someone else’s brand or copyright) that targets Internet users
who incorrectly type a website address into their web browser (e.g.,
“Gooogle.com” instead of “Google.com”). When users make such a
typographical error, they may be led to an alternative website owned by a hacker
that is usually designed for malicious purposes.


WHAT IS A BOTNET?

A botnet is a collection of connected devices, or “bots” (short for robots),
that are infected and controlled by malware. These devices could include your
PC, webcam or any number of connected appliances in your home. The
cybercriminals who distribute malware to create botnets are generally looking to
use the combined computing power of all the infected devices to launch much
larger attacks.


WHAT IS CRYPTOJACKING?

By now, you’ve probably heard of cryptocurrency, but you may not know exactly
what it is. To put it simply, cryptocurrencies are virtual currencies that have
actual monetary value in today’s world. They are limited entries of transactions
into a single database, or public ledger, that can’t be changed without
fulfilling certain conditions. These transactions are verified and added to the
public ledger through cryptocurrency mining. Cryptocurrency miners try to make
money by compiling these transactions into blocks and solving complicated
mathematical problems to compete with other miners for the cryptocurrency. While
this process of mining for cryptocurrencies can be lucrative, it requires large
amounts of computing power.

Unfortunately, the need for massive amounts of hardware has provoked
cybercriminals to participate in cryptojacking, a method of using malware to
exploit victims’ computers to mine for cryptocurrencies. Cybercrooks
spread cryptojacking malware through sketchy mobile apps, flawed software, and
malware-infected ads. They can even cryptojack your device during a browsing
session while you’re perusing a website that appears completely harmless. Once a
user’s device becomes infected, the malware drains the device’s CPU, causing the
user’s computer fan to be loud while the malware mines for cryptocurrencies in
the background. Unfortunately, symptoms of cryptojacking are usually pretty
subtle, with poor device performance being one of the few signs of its presence.


WHAT IS INTERNET SECURITY?

Internet security consists of a range of security tactics for protecting
activities and transactions conducted online over the internet. These tactics
are meant to safeguard users from threats such as hacking into computer systems,
email addresses or websites, malicious software that can infect and inherently
damage systems and identity theft by hackers who steal personal data such as
bank account information and credit card numbers. Internet security is a
specific aspect of broader concepts such as cybersecurity and computer security,
being focused on the specific threats and vulnerabilities of online access and
use of the internet.

In today's digital landscape, many of our daily activities rely on the internet.
Various forms of communication, entertainment, financial services and
work-related tasks are accomplished online. This means that tons of data and
sensitive information are constantly being shared over the internet and by
extension, the cloud. The internet is mostly private and secure, but it can also
be an insecure channel for exchanging information. With a high risk of intrusion
by hackers and cybercriminals, internet security is a top priority for
individuals and businesses alike.

Back to top 

×

ASIA PACIFIC

--------------------------------------------------------------------------------

Australia - English


New Zealand - English

Singapore - English

Malaysia - English

Philippines - English

India - English

대한민국 - 한국어

日本 - 日本語

中国 - 简体中文

香港特別行政區 - 繁體中文

台灣 - 繁體中文

 

EUROPE

--------------------------------------------------------------------------------

Česká Republika - Čeština

Danmark - Dansk

Suomi - Suomi

France - Français

Deutschland - Deutsch

Ελλάδα - Ελληνικά

Ireland - English

Magyarország - Magyar

ישראל - עברית

Italia - Italiano

Nederland - Nederlands

Norge - Bokmål

Polska - Polski

 

Portugal - Português

Россия - Русский

España - Español

Sverige - Svenska

Suisse - Français

Schweiz - Deutsch

Türkiye - Türkçe

العربية - العربية

United Kingdom - English

 

LATIN AMERICA

--------------------------------------------------------------------------------

Argentina - Español

Brasil - Português

Chile - Español

Colombia - Español

México - Español

Perú - Español

 

NORTH AMERICA

--------------------------------------------------------------------------------

United States - English

Canada - English

Canada - Français

 




* Important Terms and Offer Details:

  Subscription, Free Trial, Pricing and Automatic Renewal Terms:

  Subscription, Free Trial, Pricing and Automatic Renewal Terms: 

The amount you are charged upon purchase is the price of the first term of your
subscription. The length of your first term depends on your purchase selection
(e.g. 1 month or 1 year).  Once your first term is expired, your subscription
will be automatically renewed on an annual basis (with the exception of monthly
subscriptions, which will renew monthly) and you will be charged the renewal
subscription price in effect at the time of your renewal, until you cancel
(Vermont residents must opt-in to auto-renewal.) Unless otherwise stated, if a
savings amount is shown, it describes the difference between the introductory
first term price (available only to customers without an existing McAfee
subscription) and the renewal subscription price (e.g., first term price vs.
each year thereafter). Pricing is subject to change. If the renewal price
changes, we will notify you in advance so you always know what’s going on. You
can cancel your subscription or change your auto-renewal settings any time after
purchase from your My Account page. To learn more, click here. You may request a
refund by contacting Customer Support within 30 days of initial purchase or
within 60 days of automatic renewal (for 1 year terms or longer). Your
subscription is subject to our License Agreement and Privacy Notice.
Subscriptions covering "all" devices are limited to supported devices that you
own. Product features may be added, changed or removed during the subscription
term.  Not all features may be available on all devices.  See System
Requirements for additional information. Free Trial Terms: At the end of your
trial period you will be charged $39.99 for the first term. After the first
term, you will be automatically renewed at the renewal price (currently
$124.99/yr). We will charge you 7-days before renewal. You can cancel at any
time before you are charged.

  **Free Benefits With Auto-Renewal:

 **Free Benefits With Auto-Renewal:

For many qualifying product subscriptions McAfee offers additional benefits for
free when you are enrolled in auto-renewal. You can check your eligibility for
these benefits in your My Account page. Not all benefits are offered in all
locations or for all product subscriptions.  System Requirements apply. 
 Turning off auto-renewal terminates your eligibility for these additional
benefits.  Virus Protection Pledge (VPP): If we cannot remove a virus from your
supported device we’ll refund you the amount you paid for your current term
subscription.  The refund does not apply to any damage or loss caused by a
virus.  You are responsible for backing up your data to prevent data loss. See
terms here: mcafee.com/pledge. Safe Connect VPN:  You will receive free,
unlimited access to our VPN wireless on supported devices.

  ‡Additional Terms Specific to Identity Protection Service:

  ‡Additional Terms Specific to Identity Protection Service:

Eligibility: McAfee® Identity Protection Service Essentials is available within
active McAfee Total Protection and McAfee LiveSafe subscriptions with identity
monitoring for up to 10 unique emails. Phone number monitoring is enabled upon
activation of Automatic Renewal. Not all identity monitoring elements are
available in all countries. See Product Terms of Service for more information. 
Your subscription is subject to our License Agreement and Privacy Notice.
Product features may be added, changed or removed during the subscription term.
Some features may require registration and a valid ID number to activate. See
System Requirements for additional information. While McAfee Identity Protection
Service provides you tools and resources to protect yourself from identity
theft, no identity can be completely secure. US Only:
Fair Credit Reporting Act: You have numerous rights under the FCRA, including
the right to dispute inaccurate information in your credit report(s). Consumer
reporting agencies are required to investigate and respond to your dispute, but
are not obligated to change or remove accurate information that is reported in
compliance with applicable law. While this plan can provide you assistance in
filing a dispute, the FCRA allows you to file a dispute for free with a consumer
reporting agency without the assistance of a third party. Identity theft
insurance is not available in New York due to regulatory requirements.

 *  
 *  
 *  
 *  
 *  

--------------------------------------------------------------------------------


Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA

Products

McAfee® Total Protection
McAfee® Gamer Security
McAfee® Identity Protection Service
McAfee® Security Scan Plus
McAfee® WebAdvisor
McAfee® Techmaster Concierge
McAfee® Virus Removal Service

Resources

Antivirus
Parental Controls
Malware
Firewall
Blogs
Activate Retail Card
Threat Center
McAfee Enterprise




Support

Consumer Support
FAQs
Renewals





About

About McAfee
Careers
Contact Us
Newsroom
Investors
Privacy & Legal Terms
System Requirements
Sitemap




--------------------------------------------------------------------------------

  United States / English Copyright © 2021 McAfee, LLC
  United States / English Copyright © 2021 McAfee, LLC
null